Static task
static1
Behavioral task
behavioral1
Sample
267fbceff895af711d13bfc98a475c11_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
267fbceff895af711d13bfc98a475c11_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
267fbceff895af711d13bfc98a475c11_JaffaCakes118
-
Size
316KB
-
MD5
267fbceff895af711d13bfc98a475c11
-
SHA1
334a337ac7e15345e06a3b42b0544c9c1068050d
-
SHA256
94fd492c9d97b1ce513aafc76bb54aac3962967c17f63d6f617ebfd366ddc56d
-
SHA512
8d54bbcd74403be5d74746001916f4e21123c7da3c85a42329e40abb77d4aff58073c70a1cbc679aec35b9a7fe65398d2933c930636bdf88c0243a357edb81ca
-
SSDEEP
6144:5tcvkuOxo4ZPRxL8xkMpMLY5Zfmc95qYepfKyd92q9:vcvku1Q/L8xkwwYHraBT9f9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 267fbceff895af711d13bfc98a475c11_JaffaCakes118
Files
-
267fbceff895af711d13bfc98a475c11_JaffaCakes118.exe windows:4 windows x86 arch:x86
60e6ecde01ddd8930a5c0083c254197c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeResource
FreeLibraryAndExitThread
EnumResourceNamesW
GetThreadPriority
VirtualProtect
TlsGetValue
GetLongPathNameA
RemoveDirectoryW
CompareStringA
EnumSystemCodePagesA
EraseTape
GetShortPathNameA
MoveFileExA
SearchPathW
GetFileAttributesA
EnumCalendarInfoA
CreateIoCompletionPort
SetCommTimeouts
QueryDosDeviceW
IsValidLocale
FindNextChangeNotification
SetConsoleOutputCP
GetEnvironmentVariableW
GetPrivateProfileStringA
LocalLock
ReadConsoleInputW
FindFirstFileW
GetDiskFreeSpaceExA
DebugBreak
GetWindowsDirectoryA
WritePrivateProfileStructA
VirtualAllocEx
lstrcatW
_llseek
GetCommandLineA
GetVersionExA
lstrlenA
GetCompressedFileSizeW
ExitProcess
user32
SetMenuItemInfoW
ValidateRect
EnumClipboardFormats
GetMenuDefaultItem
GetNextDlgTabItem
RegisterWindowMessageA
CharLowerBuffW
GetForegroundWindow
EnumDisplaySettingsA
LoadKeyboardLayoutW
LoadStringA
DefMDIChildProcA
GetScrollBarInfo
SetProcessWindowStation
SetWindowsHookExW
GetWindowWord
CreateDialogParamW
EnumChildWindows
SetDlgItemTextW
EnumDisplaySettingsExW
GetDesktopWindow
GetDlgCtrlID
CheckMenuItem
GetActiveWindow
RegisterDeviceNotificationA
TranslateAcceleratorA
DispatchMessageA
GetWindowContextHelpId
GetWindowTextLengthW
TrackPopupMenuEx
MsgWaitForMultipleObjectsEx
GrayStringW
LoadBitmapW
ExitWindowsEx
CreateIconIndirect
CreateCaret
EnableWindow
FrameRect
DrawIconEx
GetWindowTextA
SetWindowLongA
GetClipboardSequenceNumber
SetForegroundWindow
OemToCharBuffW
SendDlgItemMessageA
TrackPopupMenu
MapWindowPoints
InsertMenuW
TabbedTextOutA
GetDialogBaseUnits
SetKeyboardState
ClipCursor
RemovePropA
GetProcessDefaultLayout
ChangeDisplaySettingsW
CreateWindowExA
GetKeyboardType
SendMessageW
gdi32
GetWindowExtEx
SetPolyFillMode
LineDDA
MaskBlt
PtInRegion
GetNearestPaletteIndex
SetBrushOrgEx
ExcludeClipRect
OffsetClipRgn
CreateRectRgnIndirect
GetTextCharsetInfo
SetRectRgn
CreatePolygonRgn
OffsetWindowOrgEx
CreateFontIndirectW
CreatePatternBrush
PtVisible
comdlg32
GetSaveFileNameW
CommDlgExtendedError
GetOpenFileNameW
ReplaceTextA
advapi32
RegisterServiceCtrlHandlerA
SetTokenInformation
GetPrivateObjectSecurity
ImpersonateSelf
OpenSCManagerW
SetServiceStatus
GetSidSubAuthorityCount
AbortSystemShutdownW
shell32
ShellExecuteA
Shell_NotifyIconW
SHGetPathFromIDListA
SHGetDesktopFolder
ole32
CreateBindCtx
oleaut32
SysAllocStringLen
shlwapi
PathIsNetworkPathW
PathRemoveBackslashA
UrlGetPartA
StrTrimW
StrStrIW
SHRegWriteUSValueW
PathIsPrefixW
PathAddBackslashW
StrChrIA
setupapi
SetupDiOpenDeviceInfoW
SetupFindNextLine
SetupDiEnumDriverInfoW
SetupGetInfFileListA
SetupDiCreateDeviceInfoW
SetupGetLineTextA
SetupDiClassGuidsFromNameW
SetupInitDefaultQueueCallback
SetupGetTargetPathW
SetupCloseInfFile
Sections
.text Size: 276KB - Virtual size: 274KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE