Static task
static1
Behavioral task
behavioral1
Sample
0ca04e74844414a8474af35162271972_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0ca04e74844414a8474af35162271972_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0ca04e74844414a8474af35162271972_JaffaCakes118
-
Size
62KB
-
MD5
0ca04e74844414a8474af35162271972
-
SHA1
b40d898b0d21eb262d4a6ff36030fd8bd9d130d7
-
SHA256
209324cc287117bdac61e41eaa97fbacffbef4521418d0bbff5836b0b8ee1f6d
-
SHA512
0386514c6a59b365900536e0ee14b96445977a273806cde66a61fd8810f801b9c7a4864b5e07cb8cdb0212943c6f91ebecc90d1cd3f58fc3236593b9e927ee2b
-
SSDEEP
768:TK9Y8WdcYwQwBNUWeEb8h50G7paErymPwFzum1vRhJPF3gdggZixWsZ:TK+8KcYw1bb8D0G7sOIFzuIyggZUW8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ca04e74844414a8474af35162271972_JaffaCakes118
Files
-
0ca04e74844414a8474af35162271972_JaffaCakes118.exe windows:4 windows x86 arch:x86
54a2171e36562155cf5caeec93e54f2f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SizeofResource
FreeResource
GlobalFree
lstrlenA
GetWindowsDirectoryA
lstrcpyA
lstrcatA
LoadLibraryA
GetLastError
VirtualAlloc
GetCurrentThreadId
FindResourceA
LCMapStringW
LCMapStringA
CompareStringA
GetStringTypeA
HeapFree
GetStringTypeW
WriteFile
RtlUnwind
GetModuleFileNameA
HeapDestroy
GetFileType
HeapCreate
SetHandleCount
GetOEMCP
GetStdHandle
GetCPInfo
WideCharToMultiByte
GetACP
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
MultiByteToWideChar
HeapSize
GetCurrentProcess
SetEnvironmentVariableA
GetProcAddress
TerminateProcess
Sleep
VirtualFree
ExitProcess
HeapAlloc
HeapReAlloc
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindNextFileA
FindFirstFileA
GetLocalTime
LockResource
LoadResource
GetTimeZoneInformation
GetSystemTime
CompareStringW
user32
MessageBeep
GetWindowLongA
GetActiveWindow
DestroyWindow
SetFocus
SendDlgItemMessageA
InvalidateRect
ShowWindow
UpdateWindow
SetWindowPos
ScreenToClient
GetWindowRect
DispatchMessageA
TranslateMessage
PeekMessageA
SendMessageA
CreateDialogIndirectParamA
GetMessageA
GetClientRect
EndPaint
DrawIcon
GetSysColor
BeginPaint
LoadBitmapA
CreateDialogParamA
GetDlgItem
GetDC
PostQuitMessage
DefWindowProcA
FindWindowA
ReleaseDC
CallNextHookEx
MessageBoxA
wsprintfA
GetForegroundWindow
RegisterClassExA
GetSystemMetrics
LoadCursorA
SetWindowsHookExA
CreateWindowExA
SetTimer
LoadIconA
KillTimer
UnhookWindowsHookEx
gdi32
GetPixel
CreateCompatibleDC
LineTo
CreateFontA
TextOutA
SetBkMode
GetStockObject
DeleteObject
DeleteDC
SetPixel
GetObjectA
SelectObject
MoveToEx
SetBkColor
GetDeviceCaps
SelectPalette
CreatePalette
RealizePalette
Rectangle
SetTextColor
BitBlt
CreateBitmap
CreatePatternBrush
PatBlt
CreateSolidBrush
comctl32
ImageList_Destroy
ImageList_LoadImageA
ImageList_SetBkColor
ord17
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 999B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ