Static task
static1
Behavioral task
behavioral1
Sample
261757ec57bea1e091e03ee45836c959_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
261757ec57bea1e091e03ee45836c959_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
261757ec57bea1e091e03ee45836c959_JaffaCakes118
-
Size
336KB
-
MD5
261757ec57bea1e091e03ee45836c959
-
SHA1
f14689d7409dfdd887870ea28e2e5a229a447d12
-
SHA256
dad62b95f3ec10c675aaa49c9ab0fafbfe9e52a281243199340baa345f143f25
-
SHA512
39655c1a6aef5eb0d62f5d4a2c0587f159eedf9d87743eef50318e95ae011de444ebabe9751d8f0aebdd0206848cbac6ea4007036ad9bf7e6abc460c5481662d
-
SSDEEP
6144:yWwR/hGAcSF/qC9TIZk3Rc3MHKToD+DwqWUONdm+rVNOagIAkHQgdvR:4GAc6qCNfKkqDDONdm+JAuAkHjv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 261757ec57bea1e091e03ee45836c959_JaffaCakes118
Files
-
261757ec57bea1e091e03ee45836c959_JaffaCakes118.exe windows:4 windows x86 arch:x86
9d67e7a5f96482869ecc6092aa47d509
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
_lclose
WritePrivateProfileStringA
GetEnvironmentVariableW
FillConsoleOutputCharacterA
GetSystemDefaultLCID
VirtualProtect
GetVersionExA
SetHandleInformation
CreateRemoteThread
GetTimeFormatA
WaitNamedPipeW
IsBadStringPtrW
ExitProcess
EnumTimeFormatsW
PulseEvent
FreeResource
CompareStringW
CreateDirectoryExA
FindClose
CreateMutexW
CreateNamedPipeW
SystemTimeToTzSpecificLocalTime
GetStartupInfoW
GetExitCodeProcess
GetHandleInformation
ClearCommBreak
LocalFree
GetSystemInfo
FlushConsoleInputBuffer
OutputDebugStringA
GetExitCodeThread
GetVolumeInformationW
GetModuleFileNameW
DeleteCriticalSection
IsProcessorFeaturePresent
GetCommTimeouts
GlobalLock
SetEvent
GetCommandLineA
FindNextFileA
user32
CopyIcon
GetKeyState
SetWindowContextHelpId
GetParent
SetProcessDefaultLayout
GetMessageW
DialogBoxIndirectParamA
DragDetect
LoadCursorA
AppendMenuW
GetLastActivePopup
DestroyMenu
ExcludeUpdateRgn
CallWindowProcW
SetWindowTextW
CreateDialogIndirectParamA
DispatchMessageA
CreateIcon
GetWindowLongA
IsWindowVisible
OemToCharBuffA
OpenClipboard
SendMessageW
SetMenuDefaultItem
DrawEdge
GetUserObjectInformationW
DialogBoxParamA
EnumWindowStationsW
MapDialogRect
CreateAcceleratorTableA
RegisterClassExA
MsgWaitForMultipleObjects
IsCharUpperW
DrawStateW
CharToOemA
RegisterDeviceNotificationW
DestroyCaret
LoadBitmapW
GetAsyncKeyState
SetClassLongA
DrawAnimatedRects
BringWindowToTop
UnregisterClassA
SetCursorPos
LoadKeyboardLayoutW
ScrollWindow
IsCharAlphaA
TileWindows
LoadImageA
CharUpperW
DestroyAcceleratorTable
gdi32
GetNearestColor
RealizePalette
StartDocW
PlayMetaFileRecord
CreateMetaFileA
GetTextExtentExPointA
SetViewportExtEx
TranslateCharsetInfo
comdlg32
ReplaceTextW
GetFileTitleA
advapi32
MakeSelfRelativeSD
RegCreateKeyExW
ImpersonateSelf
ClearEventLogW
ObjectCloseAuditAlarmA
RegQueryValueExA
StartServiceW
DeleteService
ImpersonateNamedPipeClient
LookupPrivilegeDisplayNameA
RegUnLoadKeyA
RegConnectRegistryA
LookupAccountNameA
EnumServicesStatusW
CryptGenRandom
EqualSid
CloseServiceHandle
BuildSecurityDescriptorW
CreateProcessAsUserA
RegDeleteValueA
RegisterServiceCtrlHandlerW
ole32
CoAddRefServerProcess
oleaut32
SafeArrayPutElement
SetErrorInfo
comctl32
ImageList_SetBkColor
shlwapi
wvnsprintfW
StrChrIW
PathIsRootA
StrCmpW
PathRemoveBlanksA
SHCopyKeyA
StrPBrkW
StrStrA
PathRemoveBlanksW
PathCombineA
SHCreateStreamOnFileW
PathIsDirectoryEmptyW
StrFormatKBSizeW
PathRelativePathToW
SHRegQueryUSValueW
Sections
.text Size: 288KB - Virtual size: 286KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE