Static task
static1
Behavioral task
behavioral1
Sample
213f13b27d3ba3b7b7b37bc8a282f5cc_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
213f13b27d3ba3b7b7b37bc8a282f5cc_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
213f13b27d3ba3b7b7b37bc8a282f5cc_JaffaCakes118
-
Size
186KB
-
MD5
213f13b27d3ba3b7b7b37bc8a282f5cc
-
SHA1
938cccc838553dd21510d623867725224960dbca
-
SHA256
b19261da07645db21f9c62c4a18866eb36faf3edacf2cc31db00a4eb51f748dd
-
SHA512
920e3875df8f4625152cd578457eb0183fdd0e0980d3d9cd835c3e8238bee7769847a9054cd9b0d7e6fd9591c5dfe7842e4de5e536a71bfedd446ae8bcd057e8
-
SSDEEP
3072:oPrt4hSey15PuSmSCxIhaSPxX1bsSQhKbd41RDEbFUugv1LDZhTaTWUSZNGPWowZ:oPrehzm5WSmSYXSPxmnho47DEpULVh+k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 213f13b27d3ba3b7b7b37bc8a282f5cc_JaffaCakes118
Files
-
213f13b27d3ba3b7b7b37bc8a282f5cc_JaffaCakes118.exe windows:4 windows x86 arch:x86
038679f64f253c67e4215cb89398d68c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
kernel32
DeleteCriticalSection
InitializeCriticalSection
CloseHandle
WaitForMultipleObjects
SetEvent
CreateThread
WaitForSingleObject
ResetEvent
VirtualAlloc
VirtualFree
GetModuleHandleA
MultiByteToWideChar
WideCharToMultiByte
GetLastError
AreFileApisANSI
GetModuleFileNameA
GetModuleFileNameW
LocalFree
FormatMessageA
FormatMessageW
GetWindowsDirectoryA
SetFileAttributesA
SetFileAttributesW
RemoveDirectoryA
RemoveDirectoryW
CreateDirectoryA
CreateDirectoryW
DeleteFileA
DeleteFileW
lstrlenA
GetFullPathNameA
GetFullPathNameW
GetCurrentDirectoryA
SetCurrentDirectoryA
GetTempPathA
GetTempFileNameA
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
CreateFileA
CreateFileW
GetFileSize
SetFilePointer
ReadFile
SetFileTime
WriteFile
SetEndOfFile
CreateEventA
LeaveCriticalSection
EnterCriticalSection
Sleep
CreateProcessA
GetCommandLineW
GetVersionExA
GetStartupInfoA
user32
EndDialog
KillTimer
PostMessageA
ShowWindow
SendMessageA
GetDlgItem
MessageBoxW
SetTimer
SetWindowTextW
SetWindowTextA
LoadStringW
LoadStringA
DialogBoxParamW
DialogBoxParamA
SetWindowLongA
GetWindowLongA
CharUpperW
CharUpperA
DestroyWindow
shell32
ShellExecuteExA
oleaut32
VariantClear
SysAllocString
msvcrt
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
_except_handler3
??1type_info@@UAE@XZ
memcpy
free
malloc
memmove
memcmp
_purecall
_CxxThrowException
__CxxFrameHandler
_controlfp
Sections
.text Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ