Static task
static1
Behavioral task
behavioral1
Sample
2240204aa5365742d995b44f41abd4a1_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2240204aa5365742d995b44f41abd4a1_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
2240204aa5365742d995b44f41abd4a1_JaffaCakes118
-
Size
48KB
-
MD5
2240204aa5365742d995b44f41abd4a1
-
SHA1
863d9da8c86a019dc93536c8508b47318a66c6d0
-
SHA256
76db2a3ab0f8cdc43a7877afc188c373055f833ce3c33e113ece4edaf91a4f2f
-
SHA512
42f82b1664b31a2baddc8b63afbcea69f1a50ca099ce687865f097bedd516f4727dcc782ffd7d5204b872e5f65ef2955fc9af53047d8fc715610a36a0c8c59f2
-
SSDEEP
1536:qXTSFgSbuXM1zd1dH2ZE9p+Pg53NF5kqZ3:qXT2gSaMD1dHIUkgNNTN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2240204aa5365742d995b44f41abd4a1_JaffaCakes118
Files
-
2240204aa5365742d995b44f41abd4a1_JaffaCakes118.exe windows:4 windows x86 arch:x86
3cd20ac4c250d0ecdc104e0872ac17bf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
NtAddAtom
advapi32
RegEnumKeyExA
RegSetValueExA
RegEnumValueA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
RegQueryValueExA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
gdi32
ExtTextOutA
SaveDC
DeleteDC
GetDeviceCaps
ModifyWorldTransform
SelectObject
SetBkColor
GetObjectA
SetGraphicsMode
RestoreDC
DPtoLP
SetViewportOrgEx
BitBlt
CreateCompatibleDC
CreateSolidBrush
CreateFontIndirectA
SetWindowOrgEx
DeleteObject
SetTextColor
GetTextMetricsA
atl
AtlMarshalPtrInProc
advpack
RegInstall
ole32
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
kernel32
lstrlenA
CreateThread
HeapFree
lstrcmpA
InitializeCriticalSection
InterlockedDecrement
lstrcmpiA
GetDiskFreeSpaceA
LocalFree
GetWindowsDirectoryA
InterlockedIncrement
lstrcatA
LoadLibraryA
HeapSize
GetModuleHandleA
CreateFileA
lstrcpyA
CreateEventA
HeapReAlloc
GetModuleFileNameA
GetProcessHeap
GetTickCount
GetSystemDirectoryA
lstrcpynA
CloseHandle
DisableThreadLibraryCalls
LocalAlloc
HeapAlloc
DeleteCriticalSection
GetProcAddress
VirtualAlloc
SetEvent
user32
SendDlgItemMessageA
EndDialog
InvalidateRect
TranslateMessage
IsDlgButtonChecked
DestroyIcon
EnableWindow
MessageBoxA
GetDC
GetWindowRect
DialogBoxParamA
GetSysColor
GetClientRect
wsprintfA
IsDialogMessageA
SendMessageA
CharPrevA
SetWindowTextA
IsWindow
DrawTextA
SetWindowLongA
LoadStringA
CreateDialogParamA
GetWindowTextA
PeekMessageA
CharUpperA
SetDlgItemTextA
CheckDlgButton
LoadBitmapA
LoadImageA
GetDlgItem
GetWindowLongA
DestroyWindow
DispatchMessageA
ShowWindow
MsgWaitForMultipleObjects
SetWindowPos
ReleaseDC
Sections
.textbss Size: - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ