Static task
static1
Behavioral task
behavioral1
Sample
262fba12e1525722b08f3d02d538bb85_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
262fba12e1525722b08f3d02d538bb85_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
262fba12e1525722b08f3d02d538bb85_JaffaCakes118
-
Size
1.4MB
-
MD5
262fba12e1525722b08f3d02d538bb85
-
SHA1
da391936cd78f4f4fe6e3ddaf14c37f18181c1bc
-
SHA256
b7d0f94bb7efc7d02b38bc26061597facd710bb70f601ac3b56d2cc76ce6ac57
-
SHA512
1afd19b878b1b5f92156a21ea30b528343b8996e9c429fc890173cbea665dca9ec69e828d849c04535177ae6354e0fe1d5278d4e09db3409004a2500a3f9bfd5
-
SSDEEP
24576:iFenONlf91ZGWeZPjNZFlaRybgmDe3Xv3Hs6l5U5fHYxz2slZ5pDJoIgcn:2eOTxleZpZncybgH3Xv3M6Kf4ToIgcn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 262fba12e1525722b08f3d02d538bb85_JaffaCakes118
Files
-
262fba12e1525722b08f3d02d538bb85_JaffaCakes118.exe windows:4 windows x86 arch:x86
90563a6b5405786669953e1062e16010
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EnumDisplaySettingsW
RegisterClassA
CreateWindowExA
SwapMouseButton
CopyAcceleratorTableW
DefWindowProcW
DdeCmpStringHandles
DdeGetLastError
RegisterClassExA
MessageBoxA
DestroyWindow
ShowWindow
comctl32
ImageList_GetImageInfo
ImageList_GetDragImage
InitCommonControlsEx
CreateStatusWindowA
ImageList_LoadImageA
ImageList_SetImageCount
CreatePropertySheetPageA
ImageList_GetIconSize
CreateMappedBitmap
DrawStatusTextA
kernel32
FreeEnvironmentStringsW
TlsFree
RtlUnwind
LCMapStringA
GetFileType
CreateMutexA
InitializeCriticalSection
GetModuleFileNameW
SetFilePointer
GetEnvironmentStrings
DeleteCriticalSection
ResetEvent
FreeEnvironmentStringsA
HeapDestroy
LeaveCriticalSection
GetLastError
TlsSetValue
GetVersion
CopyFileA
GetStartupInfoA
GetCommandLineW
GetModuleFileNameA
CreateProcessW
SetStdHandle
VirtualFree
GetCPInfo
TlsAlloc
ReadFile
InterlockedExchange
LoadLibraryA
InterlockedDecrement
QueryPerformanceCounter
GetModuleHandleA
GetACP
TlsGetValue
TerminateProcess
ExitProcess
WritePrivateProfileSectionA
VirtualQuery
GetCurrentThreadId
GetTickCount
WriteFile
LCMapStringW
EnterCriticalSection
GetCurrentProcess
GetConsoleCP
IsBadWritePtr
GetProcAddress
WideCharToMultiByte
FindResourceA
FlushFileBuffers
GetVolumeInformationA
WriteProfileStringW
GetLocalTime
OpenMutexA
GlobalFix
GetCurrentThread
SetEnvironmentVariableA
WriteConsoleInputA
MultiByteToWideChar
lstrcmpiA
HeapFree
HeapReAlloc
GetCurrentProcessId
UnhandledExceptionFilter
InterlockedIncrement
CompareStringW
SetLastError
GetStringTypeW
GetStringTypeA
GetEnvironmentStringsW
GetSystemTime
CreateDirectoryW
CloseHandle
LocalSize
GetCommandLineA
CreateWaitableTimerW
SetCurrentDirectoryA
GetStdHandle
HeapAlloc
SetHandleCount
GetSystemTimeAsFileTime
VirtualAlloc
GetStartupInfoW
CompareStringA
EnumDateFormatsExA
VirtualQueryEx
GetTimeZoneInformation
HeapCreate
Sections
.text Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 242KB - Virtual size: 246KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ