Static task
static1
Behavioral task
behavioral1
Sample
0d1d55cadc0bd6f323c5133c3fcc5ca4_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0d1d55cadc0bd6f323c5133c3fcc5ca4_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0d1d55cadc0bd6f323c5133c3fcc5ca4_JaffaCakes118
-
Size
119KB
-
MD5
0d1d55cadc0bd6f323c5133c3fcc5ca4
-
SHA1
32696207a3bcd942e4c28587d80d6db22cc9c3d0
-
SHA256
2ef253c51f4d73ce4272c096061f9092b99de5db790358a38a23230cc2ec287d
-
SHA512
5aec0910ed74771c0939dcfe2e42cd67eaa7adfadd0b411a627ced2a10a1459e8d5693336fecde9f564c6649ba10d0d03a70970cc2da87ae3b5f1eae26d3760e
-
SSDEEP
1536:wLaEmCKqUyZo2fPzY7K8xWluRopGLGMH1wvSZeM7+Rot:wLoCKbR24RxWAo4LRYEX+Rot
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d1d55cadc0bd6f323c5133c3fcc5ca4_JaffaCakes118
Files
-
0d1d55cadc0bd6f323c5133c3fcc5ca4_JaffaCakes118.exe windows:4 windows x86 arch:x86
df79f57af2ce5fc48e6ed1c7ea7cd423
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
SetFileAttributesA
CreateThread
CloseHandle
FindNextFileA
SuspendThread
FindClose
Sleep
ResumeThread
LocalFree
LocalAlloc
lstrcmpiA
InitializeCriticalSection
FreeLibrary
GetProcAddress
LoadLibraryA
_lread
DeleteCriticalSection
GetCurrentDirectoryA
GetWindowsDirectoryA
WinExec
GetFileSize
GetSystemDirectoryA
GetACP
CreateEventA
OpenEventA
CreateDirectoryA
GetDiskFreeSpaceA
_lcreat
_lwrite
_lclose
DeleteFileA
lstrlenA
OpenFile
GetModuleFileNameA
GetPrivateProfileIntA
lstrcatA
WritePrivateProfileStringA
RemoveDirectoryA
MultiByteToWideChar
_llseek
SetCurrentDirectoryA
_lopen
IsBadReadPtr
VirtualAlloc
WriteFile
VirtualFree
HeapCreate
HeapDestroy
GetStdHandle
GetFileType
SetHandleCount
GetOEMCP
SetUnhandledExceptionFilter
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
lstrcpyA
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
ExitProcess
HeapAlloc
HeapFree
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
RtlUnwind
HeapReAlloc
IsBadCodePtr
IsBadWritePtr
HeapSize
user32
GetCursorPos
SetDlgItemTextA
ShowWindow
SendMessageA
GetClassLongA
ScreenToClient
EnableWindow
GetDlgItem
DrawIcon
MoveWindow
ReleaseDC
SetClassLongA
GetDesktopWindow
GetDC
LoadStringA
wsprintfA
PostMessageA
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
UpdateWindow
GetClientRect
DefWindowProcA
BeginPaint
EndPaint
PostQuitMessage
GetMessageA
IsWindow
IsDialogMessageA
DispatchMessageA
EndDialog
DialogBoxParamA
CreateDialogParamA
ExitWindowsEx
CheckDlgButton
SetWindowTextA
SetTimer
MessageBoxA
IsDlgButtonChecked
KillTimer
GetDlgItemTextA
GetWindowRect
SetWindowPos
DestroyWindow
TranslateMessage
gdi32
CreatePalette
SelectPalette
StretchDIBits
SetStretchBltMode
RealizePalette
DeleteObject
advapi32
RegOpenKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyA
RegSetValueA
RegQueryValueA
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
ole32
CoInitialize
CoUninitialize
CoCreateInstance
comctl32
ImageList_LoadImageA
ord17
winmm
ord2
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE