Static task
static1
Behavioral task
behavioral1
Sample
24231b5e1fc94baa74ba1038de1d84c4_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
24231b5e1fc94baa74ba1038de1d84c4_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
24231b5e1fc94baa74ba1038de1d84c4_JaffaCakes118
-
Size
312KB
-
MD5
24231b5e1fc94baa74ba1038de1d84c4
-
SHA1
7ebd32caa39f8babd93a97831e0110a1d5675db5
-
SHA256
a372f11ccc9f21fb81bdf5182cff9a9629ac619c833914851598c4fb61dc4229
-
SHA512
2779ea9eec081f1e83ebbc6b893427a0c7c6641bcdf5b96939cb436842ea9a6c25fc6e59cca75988364441b8abf09e867c0d44327def6729fcbcb4fa74a3d629
-
SSDEEP
6144:cN1EkztxcGBXZgKfs9EYhITXoFMyertz993nsCrf3+EVKU1Ft/3O33Ez:eLfcYpgK0dhITuMyerh3sCrm61DC0z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 24231b5e1fc94baa74ba1038de1d84c4_JaffaCakes118
Files
-
24231b5e1fc94baa74ba1038de1d84c4_JaffaCakes118.exe windows:4 windows x86 arch:x86
240ba02f7b64dc784f978257c92e8913
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsDebuggerPresent
GlobalGetAtomNameW
GetCompressedFileSizeW
GetConsoleTitleW
EnterCriticalSection
UnmapViewOfFile
VirtualProtect
GetVersionExA
BackupWrite
AddAtomA
LocalReAlloc
HeapFree
lstrcpyW
HeapValidate
CreateFiber
SwitchToThread
lstrlenW
SetConsoleTitleA
GetProcAddress
SetFileAttributesA
GetNumberFormatA
ScrollConsoleScreenBufferA
DeleteCriticalSection
SuspendThread
_lread
ReleaseSemaphore
CancelWaitableTimer
WriteConsoleA
ConvertDefaultLocale
IsValidCodePage
SetProcessWorkingSetSize
LocalUnlock
WaitForMultipleObjectsEx
VirtualFree
GetCommandLineW
ReadConsoleInputW
GetCommandLineA
GetConsoleCursorInfo
ExitProcess
user32
WinHelpA
DefMDIChildProcA
IsWindowEnabled
IsDialogMessageW
FindWindowA
InsertMenuItemA
GetParent
ToUnicode
GetMenuItemInfoW
DeferWindowPos
CharLowerBuffW
IntersectRect
DefMDIChildProcW
CountClipboardFormats
ChangeDisplaySettingsA
MoveWindow
SendMessageCallbackW
GetLastActivePopup
SetCursorPos
CharNextExA
GetKeyboardType
FindWindowExA
CharUpperA
MessageBoxIndirectW
TranslateMessage
UnhookWindowsHookEx
HideCaret
PostMessageW
GetDlgItemTextA
SwitchDesktop
LoadCursorFromFileW
GrayStringW
GetClipboardSequenceNumber
ClientToScreen
CallNextHookEx
GetDoubleClickTime
LoadStringA
SetLastErrorEx
EnumDisplaySettingsW
ShowOwnedPopups
SwitchToThisWindow
InSendMessage
GetThreadDesktop
CopyAcceleratorTableW
ScrollWindowEx
gdi32
CreatePenIndirect
GetNearestPaletteIndex
GetTextExtentPointA
SetWorldTransform
CreateDCA
SetStretchBltMode
AbortDoc
GetNearestColor
GetSystemPaletteUse
PtInRegion
SetWinMetaFileBits
CreateDIBSection
FillRgn
advapi32
RegLoadKeyA
OpenSCManagerW
GetSidIdentifierAuthority
GetServiceKeyNameW
GetFileSecurityW
CopySid
RegEnumValueW
OpenProcessToken
RegCreateKeyW
ChangeServiceConfigW
AllocateAndInitializeSid
CryptExportKey
AccessCheckAndAuditAlarmA
RegQueryValueW
shell32
SHGetSpecialFolderPathW
SHGetPathFromIDListA
ExtractAssociatedIconA
ole32
OleRegGetMiscStatus
ReadClassStm
OleCreateStaticFromData
CoReleaseMarshalData
OleSaveToStream
OleDestroyMenuDescriptor
StringFromCLSID
CoFreeAllLibraries
CoGetClassObject
comctl32
ImageList_GetIcon
shlwapi
SHRegCloseUSKey
PathStripToRootW
StrStrW
PathStripPathA
PathFindExtensionW
PathCombineA
PathAddBackslashA
PathStripPathW
StrFormatByteSizeW
setupapi
SetupCommitFileQueueA
SetupInstallServicesFromInfSectionA
SetupInitDefaultQueueCallback
Sections
.text Size: 296KB - Virtual size: 295KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE