Static task
static1
Behavioral task
behavioral1
Sample
15120589ac833d58dea302c8dddbb868_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
15120589ac833d58dea302c8dddbb868_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
15120589ac833d58dea302c8dddbb868_JaffaCakes118
-
Size
40KB
-
MD5
15120589ac833d58dea302c8dddbb868
-
SHA1
58a9f0065fbc32c56451f7f21a70f56cb2989616
-
SHA256
bb8c5766041a750c3a4d9aeb2b1b7befb6527c1eb80f71c133bc3742b99c91af
-
SHA512
c9d564fa921c7049522aace9f754a19a95e22d13a6a1a36cc20c7c0616e2f4d6a8631ca9c7a898d818ebd800a85b2e5fc0e5aaab1cf0640d24b6cadd73a4de37
-
SSDEEP
384:myKVoo4CTjdXVvCWNp65R4IrhTIXhZnWTB7BVwAeM:mn2o48lQ5Rz9TmZe7BVwW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 15120589ac833d58dea302c8dddbb868_JaffaCakes118
Files
-
15120589ac833d58dea302c8dddbb868_JaffaCakes118.exe windows:4 windows x86 arch:x86
b27eec1a6f5477542760ac295521c8bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FileTimeToLocalFileTime
VirtualAlloc
GetCommandLineA
lstrcpynA
GetProfileStringA
GetFileAttributesExA
GetLocaleInfoW
DuplicateHandle
Beep
UnhandledExceptionFilter
SetEndOfFile
GetPrivateProfileSectionW
SystemTimeToFileTime
GetUserDefaultLCID
GlobalUnlock
SetStdHandle
EnumCalendarInfoW
ExitProcess
lstrcmpA
EnumResourceLanguagesW
ReadConsoleA
GetConsoleCursorInfo
_llseek
SetConsoleMode
user32
EmptyClipboard
RedrawWindow
ScreenToClient
RegisterClassA
SetWindowsHookExW
TrackPopupMenu
RegisterClipboardFormatW
PostThreadMessageW
GetDialogBaseUnits
GetMenuItemInfoW
LoadBitmapW
GetSysColorBrush
GetSystemMetrics
ChangeDisplaySettingsA
TranslateMDISysAccel
FrameRect
GetClipboardData
DrawIconEx
GetKeyboardLayout
CloseClipboard
ChangeMenuW
GetForegroundWindow
GetMenuItemID
CallNextHookEx
MapVirtualKeyExW
LoadIconA
CharUpperW
SendNotifyMessageW
ChildWindowFromPointEx
OemToCharBuffA
CharToOemA
GetClassNameW
SetTimer
GetMenuItemCount
DialogBoxIndirectParamW
SwapMouseButton
CopyAcceleratorTableA
SetMenuInfo
GetWindowInfo
CheckMenuRadioItem
DefMDIChildProcW
DispatchMessageA
DestroyAcceleratorTable
DrawTextA
LoadStringW
GetUpdateRect
SetClassLongW
GetClassInfoW
SwitchDesktop
SetWindowPos
DrawTextExW
GetTitleBarInfo
UnregisterDeviceNotification
gdi32
GetDeviceCaps
EnumFontsW
GetOutlineTextMetricsA
GdiComment
GetRgnBox
comdlg32
PrintDlgA
GetSaveFileNameW
GetOpenFileNameW
advapi32
ReadEventLogW
RegisterEventSourceW
AllocateLocallyUniqueId
AccessCheck
IsValidSecurityDescriptor
CryptCreateHash
AddAccessAllowedAce
SetEntriesInAclA
GetSidSubAuthority
CreateProcessAsUserW
CreateServiceA
LookupPrivilegeValueW
RegQueryValueExW
RegUnLoadKeyA
RegDeleteValueA
RegOpenKeyExW
RegisterEventSourceA
RegSaveKeyA
CryptGetKeyParam
RegNotifyChangeKeyValue
RegSetKeySecurity
DeregisterEventSource
RegUnLoadKeyW
AbortSystemShutdownW
SetSecurityInfo
AccessCheckAndAuditAlarmA
GetServiceDisplayNameW
IsTextUnicode
SetNamedSecurityInfoW
StartServiceCtrlDispatcherW
LookupAccountNameW
MakeAbsoluteSD
RegisterServiceCtrlHandlerW
CryptGenKey
AdjustTokenPrivileges
CryptDecrypt
shell32
ExtractIconA
Shell_NotifyIconW
SHGetSettings
SHChangeNotify
ExtractIconExW
ole32
OleConvertIStorageToOLESTREAM
StringFromGUID2
OleFlushClipboard
CreateBindCtx
ReadClassStm
oleaut32
SafeArrayCreate
SysFreeString
SafeArrayGetLBound
VariantChangeType
SafeArrayRedim
SetErrorInfo
SafeArrayUnaccessData
shlwapi
PathGetDriveNumberA
PathRelativePathToW
PathGetDriveNumberW
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 272KB - Virtual size: 270KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE