Static task
static1
Behavioral task
behavioral1
Sample
21838cffcc12d3643aabc417e3676cb7_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
21838cffcc12d3643aabc417e3676cb7_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
21838cffcc12d3643aabc417e3676cb7_JaffaCakes118
-
Size
61KB
-
MD5
21838cffcc12d3643aabc417e3676cb7
-
SHA1
ad2c2f5d1084e7a78be580ba570b96c84a5cc3b3
-
SHA256
c1b217dc87340f3972190836bee1dcd56a78b0c160b2cf23d6c3bcd7a5bdf004
-
SHA512
3aef0167d6816db955565473d8d6d43fd3ec66c6f98a88f69077742651039dc3c77aa3ce4a2a9d4573836c855ed60259836f0711ee034394eca3aaec129b1287
-
SSDEEP
1536:CktcaeahpeymYzGv8Q+xfuNXZeffW3/tWJCfmbwM:CycZaSpQQ+xGzeffWFQCflM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 21838cffcc12d3643aabc417e3676cb7_JaffaCakes118
Files
-
21838cffcc12d3643aabc417e3676cb7_JaffaCakes118.exe windows:4 windows x86 arch:x86
8e947964b6c2622e97812bee43240577
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
FindClose
FindFirstFileA
GetTempPathA
GetVersionExA
FreeLibrary
LoadLibraryA
CloseHandle
WriteFile
CreateFileA
SizeofResource
LockResource
LoadResource
FindResourceA
GetShortPathNameA
lstrcmpiA
CopyFileA
lstrlenA
Sleep
GetTickCount
GetModuleFileNameA
GetFileAttributesA
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
lstrcpynA
FileTimeToSystemTime
TerminateProcess
WaitForSingleObject
CreateDirectoryA
RemoveDirectoryA
ResumeThread
SetPriorityClass
GetCurrentProcess
GetCurrentThread
SetThreadPriority
CreateProcessA
GetTempFileNameA
HeapAlloc
GetSystemInfo
HeapCreate
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FlushInstructionCache
GetModuleHandleA
GetStartupInfoA
ExitProcess
GetCommandLineA
HeapFree
RaiseException
InterlockedExchange
LocalAlloc
GetProcAddress
GetLastError
lstrcpyA
lstrcatA
EnumResourceNamesA
DeleteFileA
GetLocalTime
OpenProcess
SystemTimeToFileTime
user32
GetWindowThreadProcessId
IsWindow
SendMessageTimeoutA
SetWindowLongA
GetWindowLongA
CallWindowProcA
DestroyWindow
GetSystemMetrics
wsprintfA
DefWindowProcA
PostQuitMessage
CreateWindowExA
CharNextA
GetClassInfoExA
LoadCursorA
RegisterClassExA
FindWindowA
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegQueryValueExA
shell32
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
ole32
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
VarR8FromStr
VarI4FromStr
VarBstrFromI4
SysFreeString
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 195KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ