Static task
static1
Behavioral task
behavioral1
Sample
24e82938dff9dff9abdd126328954284_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
24e82938dff9dff9abdd126328954284_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
24e82938dff9dff9abdd126328954284_JaffaCakes118
-
Size
424KB
-
MD5
24e82938dff9dff9abdd126328954284
-
SHA1
5a5a0d400356b00e5ad86fd9058bdfc8c9adbe33
-
SHA256
6d8aa0bdfdcc3b5ebf2e0a91dbb765f0db78132881390ed020e65c2b04f0545b
-
SHA512
cdbb99d68c9c0c13a138805045b9c2a89569d3e03086ac852bc5d3d76836a3aa6e72df2f8086cd5a77ae15ec2174165716c3b4586c863b84c0a114b940f4b4d7
-
SSDEEP
6144:YjHdUefrwMqamXwq6eX/QkGY0viPKd9Kxo9+gXlU8wrhnDGz0ORpC8lqDDgh81xR:YjGtamEeUGK2Gm8OhC0ORNlWU2+5T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 24e82938dff9dff9abdd126328954284_JaffaCakes118
Files
-
24e82938dff9dff9abdd126328954284_JaffaCakes118.exe windows:4 windows x86 arch:x86
49f16acdd5efe50b7a70c7d3cef6c7ea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileW
GetSystemInfo
GlobalGetAtomNameW
GetDriveTypeW
FindCloseChangeNotification
GetVersionExA
GetCommandLineA
lstrlenA
ExitProcess
VirtualAlloc
user32
DialogBoxIndirectParamW
SendMessageTimeoutW
DestroyAcceleratorTable
CreateCursor
GetKeyboardType
EnumDisplaySettingsW
RegisterHotKey
SetWindowLongW
EndDeferWindowPos
GetDlgCtrlID
ValidateRect
GetWindowContextHelpId
ReplyMessage
CascadeWindows
IsDialogMessageW
OpenWindowStationA
UnloadKeyboardLayout
PostMessageA
WaitMessage
RemoveMenu
IsCharUpperA
CallNextHookEx
CharUpperA
CreateDialogParamW
UnhookWindowsHookEx
SendMessageA
MenuItemFromPoint
SetUserObjectSecurity
BeginDeferWindowPos
EnableScrollBar
GetKeyboardLayoutList
ScrollDC
CharNextExA
SetCaretBlinkTime
ArrangeIconicWindows
DefWindowProcW
GetWindowPlacement
GetMenuState
gdi32
GetNearestColor
ExtCreatePen
advapi32
ImpersonateNamedPipeClient
AllocateAndInitializeSid
GetServiceKeyNameW
GetSidLengthRequired
LookupAccountSidW
SetSecurityDescriptorOwner
shell32
SHFileOperationA
SHGetPathFromIDListA
ole32
CoFreeAllLibraries
MkParseDisplayName
CreateStreamOnHGlobal
CoMarshalInterThreadInterfaceInStream
OleQueryLinkFromData
OleSave
CoTreatAsClass
CoTaskMemRealloc
StgOpenStorage
CoGetObject
oleaut32
SafeArrayGetElement
SafeArrayGetLBound
SetErrorInfo
LoadTypeLibEx
SysAllocStringLen
QueryPathOfRegTypeLi
comctl32
PropertySheetW
shlwapi
PathGetArgsW
PathStripToRootW
SHCopyKeyA
PathQuoteSpacesW
UrlCreateFromPathW
PathIsNetworkPathW
SHRegSetUSValueW
Sections
eowgcu Size: 340KB - Virtual size: 337KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
qymekom Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ucsso Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cqwcgg Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ