Static task
static1
Behavioral task
behavioral1
Sample
0f4fa4f215eefbd176eeaa91f0d16387_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0f4fa4f215eefbd176eeaa91f0d16387_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0f4fa4f215eefbd176eeaa91f0d16387_JaffaCakes118
-
Size
147KB
-
MD5
0f4fa4f215eefbd176eeaa91f0d16387
-
SHA1
3920b2e4692f727a114b4d79a0c8e8f23c7cec51
-
SHA256
49a1a9f485415ee30690210c1c2c511fecb3dd69f7481f3377fed38a508b0cac
-
SHA512
e40ce74bbd80231987d226e70e2f88603efe264383d8784faac9417dba5adb58bd5e4a54a858b7cefd3ec643ff13b9d774f2aefc7e1ae0fff9e7ef38e7feb244
-
SSDEEP
3072:CKLk7lVPojUAv/uvnJvtq5mzc1KljyIL+fQUNOKQsdpJZUWIBEj:CKzX/YvJzc1KljmfXfAWIBEj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f4fa4f215eefbd176eeaa91f0d16387_JaffaCakes118
Files
-
0f4fa4f215eefbd176eeaa91f0d16387_JaffaCakes118.exe windows:4 windows x86 arch:x86
e5d1db9d277cb9c542aafead60007f7e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoW
CreateDirectoryW
GetLongPathNameW
GetExpandedNameA
BeginUpdateResourceA
CreateMutexA
EnumTimeFormatsW
CreateFiber
VirtualAlloc
lstrlen
WaitForMultipleObjects
GetWindowsDirectoryA
GlobalFindAtomA
GetShortPathNameA
CopyFileExA
HeapCreate
WaitForSingleObject
OpenWaitableTimerW
GetSystemTime
GetCommandLineW
CreateFileA
GetWindowsDirectoryW
GetThreadLocale
IsValidLocale
GetSystemDefaultLCID
CreateMailslotW
CreateFileMappingW
GetFullPathNameW
SetCalendarInfoW
lstrcatW
GetCurrentDirectoryW
GetTimeFormatW
MultiByteToWideChar
SetLastError
CreateNamedPipeW
GlobalFindAtomW
lstrcpynA
SetCurrentDirectoryA
FindAtomW
ExitProcess
user32
CharNextW
SetForegroundWindow
DestroyMenu
LoadMenuA
GetSystemMetrics
DrawTextW
EnumClipboardFormats
LoadMenuW
LoadBitmapA
GetWindowTextLengthA
GetMenu
GetMenuItemRect
GetClassInfoExW
CopyIcon
GetCursorPos
BringWindowToTop
LoadImageW
ClientToScreen
SetTimer
SendDlgItemMessageW
ShowCaret
FindWindowW
AppendMenuA
WaitForInputIdle
GetWindowTextW
UnregisterClassW
GetParent
SetCursor
RegisterClassExW
GetKeyState
CheckMenuItem
EnableWindow
GetClassLongW
FlashWindow
DefFrameProcW
SendDlgItemMessageA
LoadBitmapW
SetDlgItemInt
SetWindowRgn
IsWindowEnabled
IsIconic
FindWindowA
gdi32
RemoveFontResourceExA
GetTextFaceW
CreateScalableFontResourceW
CreateEllipticRgn
SetMapperFlags
ScaleWindowExtEx
GetDCOrgEx
GetPaletteEntries
GetStretchBltMode
Pie
UpdateColors
SwapBuffers
advapi32
RegDeleteValueA
RegSaveKeyW
RegCreateKeyExW
RegReplaceKeyA
RegOpenKeyExW
RegReplaceKeyW
shell32
SHGetFileInfoA
comdlg32
PageSetupDlgW
GetOpenFileNameW
PageSetupDlgA
wsock32
AcceptEx
bind
WSARecvEx
ioctlsocket
Sections
.5. Size: 11KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.#n?Bd- Size: 512B - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sg Size: 2KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l":h Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.$J Size: 1KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dVWm Size: 1024B - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Kw*OX? Size: 3KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 704B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ