Static task
static1
Behavioral task
behavioral1
Sample
1546e8de26dd7f2b13cbc438adb4a178_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1546e8de26dd7f2b13cbc438adb4a178_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1546e8de26dd7f2b13cbc438adb4a178_JaffaCakes118
-
Size
48KB
-
MD5
1546e8de26dd7f2b13cbc438adb4a178
-
SHA1
caf476370a5979a6b9f7d97a3a832949979b1a35
-
SHA256
a9c5dc7141ca285d8d52e5f4fc025ec6fd3c7bb10c6888e17686ac91514a0e52
-
SHA512
c048dff857b3d133b6bd5cce9aa8ea28676ec91cfbdeb078548ef157a701a561d060f22fbb2da58815cfe1af08fa5fb65e25471546d96afd6a1b21ec4caa7b03
-
SSDEEP
768:X8ttoDPSk2mPFF73S7hhckNwGJGzNEIvzHuaJ2ivh+IBZ1TwPW/0qeSsy:XgtoDLPF+q+4NnvzHuagiv88xLeU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1546e8de26dd7f2b13cbc438adb4a178_JaffaCakes118
Files
-
1546e8de26dd7f2b13cbc438adb4a178_JaffaCakes118.exe windows:4 windows x86 arch:x86
075398b2d4946335577e2565e6c94058
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DestroyWindow
SetWindowLongA
GetSysColor
PeekMessageA
IsDialogMessageA
CharPrevA
wsprintfA
GetWindowRect
CreateDialogParamA
GetDC
GetWindowLongA
GetWindowTextA
SetDlgItemTextA
DrawTextA
TranslateMessage
EndDialog
IsDlgButtonChecked
SendMessageA
MsgWaitForMultipleObjects
DialogBoxParamA
CharUpperA
SendDlgItemMessageA
SetWindowTextA
SetWindowPos
DispatchMessageA
LoadImageA
GetClientRect
LoadStringA
LoadBitmapA
GetDlgItem
CheckDlgButton
InvalidateRect
ShowWindow
EnableWindow
ReleaseDC
DestroyIcon
IsWindow
MessageBoxA
atl
AtlMarshalPtrInProc
kernel32
HeapAlloc
HeapSize
GetProcessHeap
lstrcpynA
SetEvent
GetModuleHandleA
DeleteCriticalSection
lstrcpyA
InterlockedDecrement
FreeLibrary
CreateEventA
HeapFree
lstrcmpiA
DisableThreadLibraryCalls
CreateFileA
LocalFree
lstrcmpA
CloseHandle
GetWindowsDirectoryA
LoadLibraryA
GetModuleFileNameA
GetProcAddress
GetDiskFreeSpaceA
CreateThread
InitializeCriticalSection
lstrcatA
InterlockedIncrement
VirtualAlloc
GetTickCount
HeapReAlloc
GetSystemDirectoryA
LocalAlloc
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
ole32
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
advapi32
RegDeleteKeyA
RegEnumKeyExA
RegCloseKey
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
ntdll
NtAddAtom
advpack
RegInstall
gdi32
GetObjectA
GetDeviceCaps
SetBkColor
RestoreDC
BitBlt
SaveDC
GetTextMetricsA
CreateCompatibleDC
ExtTextOutA
DPtoLP
SetWindowOrgEx
ModifyWorldTransform
SetViewportOrgEx
CreateSolidBrush
SelectObject
DeleteDC
CreateFontIndirectA
SetGraphicsMode
SetTextColor
DeleteObject
Sections
.textbss Size: - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ