Static task
static1
Behavioral task
behavioral1
Sample
19b8d7015ccd4f9372b8ca30f2665665_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
19b8d7015ccd4f9372b8ca30f2665665_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
19b8d7015ccd4f9372b8ca30f2665665_JaffaCakes118
-
Size
296KB
-
MD5
19b8d7015ccd4f9372b8ca30f2665665
-
SHA1
e11aa6cda861225e88e429c6d74d9bc5dc4ec52c
-
SHA256
4953c40c3bb5f8dbd43a804e36de89c9983f780f550a26bdd79e8410006b6301
-
SHA512
8dbd75e8211ea656a8d24a9678f0f1b09e2e96af735ca256b7e34e2af7b8561a59160e9eef5cb20289bdcae500a7b3b9215b677aa7ecc2cee547376ceee1fa89
-
SSDEEP
6144:uY94NghcYAuh3fmijC3IksZX8lRf3VtdhNFPKWG94ZCZQQLL+x39dxw8H:F9OC+uh9O3Vtzv0oNyk3HxLH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19b8d7015ccd4f9372b8ca30f2665665_JaffaCakes118
Files
-
19b8d7015ccd4f9372b8ca30f2665665_JaffaCakes118.exe windows:4 windows x86 arch:x86
9e4ae47be6b2da99465da01af17e3b32
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CompareStringA
CreateDirectoryA
CreateFileA
DeleteFileA
DosDateTimeToFileTime
ExitProcess
ExpandEnvironmentStringsA
FileTimeToDosDateTime
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindResourceA
FlushFileBuffers
FreeLibrary
GetCommandLineA
GetCurrentDirectoryA
GetDateFormatA
GetFileAttributesA
GetFileType
GetFullPathNameA
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetNumberFormatA
GetProcessHeap
GetTempPathA
GetTimeFormatA
GetVersionExA
HeapAlloc
HeapFree
LoadLibraryA
LocalFileTimeToFileTime
MoveFileA
MoveFileExA
ReadFile
SetCurrentDirectoryA
SetFileAttributesA
SetFilePointer
SetFileTime
Sleep
WaitForSingleObject
WriteFile
lstrcmpiA
VirtualProtect
GetModuleFileNameA
ExitProcess
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
gdi32
DeleteObject
shell32
SHBrowseForFolderA
SHFileOperationA
SHGetFileInfoA
SHGetMalloc
ShellExecuteExA
SHGetPathFromIDListA
user32
CharToOemBuffA
CharUpperA
DialogBoxParamA
DispatchMessageA
EnableWindow
EndDialog
GetClientRect
GetDlgItem
GetDlgItemTextA
GetMessageA
GetSysColor
GetSystemMetrics
GetWindow
GetWindowLongA
GetWindowRect
GetWindowTextA
GetWindowTextLengthA
LoadIconA
LoadStringA
MessageBoxA
OemToCharA
OemToCharBuffA
PeekMessageA
PostMessageA
SendDlgItemMessageA
SendMessageA
SetDlgItemTextA
SetFocus
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
TranslateMessage
wsprintfA
wvsprintfA
MessageBoxA
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE