Static task
static1
Behavioral task
behavioral1
Sample
0e28d140568fe4af98c402a1771bbd04_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0e28d140568fe4af98c402a1771bbd04_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0e28d140568fe4af98c402a1771bbd04_JaffaCakes118
-
Size
48KB
-
MD5
0e28d140568fe4af98c402a1771bbd04
-
SHA1
8e8324e99f248dd476030c930768f53fcfcb1f88
-
SHA256
14d391a1c55bb312b4e62a84304cd6b88b795d6111ef85a648a4c2956d7293c3
-
SHA512
6e1d54fb450da0f731c0fef27d0e26ba03632c7758072a0bae9f038f68a053fa4583b3f4255d6e2f0864fa09fb8fb81147af065590c4e1d2790d9970cc710479
-
SSDEEP
768:m+UlTkje9yaZR5b+yrti5xf0xaNu1MKTsTyckXWy3n8kwBMk850kbLV:mdTk2yaHJ+yeKEi9m4kBe5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e28d140568fe4af98c402a1771bbd04_JaffaCakes118
Files
-
0e28d140568fe4af98c402a1771bbd04_JaffaCakes118.exe windows:4 windows x86 arch:x86
f49732358a146810f30cc6f619f28419
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
FindClose
FindFirstFileA
GetTempPathA
GetVersionExA
FreeLibrary
LoadLibraryA
CloseHandle
WriteFile
CreateFileA
SizeofResource
LockResource
LoadResource
FindResourceA
GetShortPathNameA
lstrcmpiA
CopyFileA
lstrlenA
Sleep
GetTickCount
GetModuleFileNameA
GetFileAttributesA
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
lstrcpynA
FileTimeToSystemTime
CreateDirectoryA
GetWindowsDirectoryA
OpenProcess
RemoveDirectoryA
ResumeThread
SetPriorityClass
GetCurrentProcess
GetCurrentThread
SetThreadPriority
CreateProcessA
GetTempFileNameA
HeapAlloc
GetSystemInfo
HeapCreate
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
SystemTimeToFileTime
FlushInstructionCache
GetModuleHandleA
GetStartupInfoA
ExitProcess
GetCommandLineA
HeapFree
lstrcpyA
lstrcatA
EnumResourceNamesA
DeleteFileA
GetLocalTime
WaitForSingleObject
TerminateProcess
GetCurrentThreadId
GetProcAddress
RaiseException
InterlockedExchange
LocalAlloc
user32
IsWindow
wsprintfA
GetWindowLongA
PostQuitMessage
FindWindowA
SendMessageTimeoutA
DefWindowProcA
CallWindowProcA
DestroyWindow
GetWindowThreadProcessId
GetClassInfoExA
SetWindowLongA
CharNextA
CreateWindowExA
LoadCursorA
RegisterClassExA
GetSystemMetrics
advapi32
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegQueryInfoKeyA
RegOpenKeyExA
shell32
SHGetMalloc
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ole32
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
VarR8FromStr
VarI4FromStr
VarBstrFromI4
SysFreeString
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ