Static task
static1
Behavioral task
behavioral1
Sample
26c6c471d6ca864c6e39af4ab2d829a9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
26c6c471d6ca864c6e39af4ab2d829a9_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
26c6c471d6ca864c6e39af4ab2d829a9_JaffaCakes118
-
Size
384KB
-
MD5
26c6c471d6ca864c6e39af4ab2d829a9
-
SHA1
559f8e7f5b0ec9041388b9ace2e43f0a7336bd5d
-
SHA256
7c18a410c2522f8b168363e033ae1c5cb91e85597042f184240d260e85338b2e
-
SHA512
ad567d319e114d8afd600f0b0f600c5d15ccbee96654d4e317c040592c3d13950907f2328dfc857e55e4af41cbae3021e313109f061276f5c633fc45594a4442
-
SSDEEP
6144:E6bpWvKZyHATZqe6kwgllq6eiSgQDRsD8V+8xestOweutvqM9Dn+PUSCj9RQZ5hN:rbpL8A42TFDSgnoYIeyPf9DHS9ZL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 26c6c471d6ca864c6e39af4ab2d829a9_JaffaCakes118
Files
-
26c6c471d6ca864c6e39af4ab2d829a9_JaffaCakes118.exe windows:4 windows x86 arch:x86
18041ddc078c94d9887e4cfbe0681c75
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceExW
GetCurrentProcess
GetACP
PeekNamedPipe
WriteFile
SetThreadLocale
GetFileInformationByHandle
AllocConsole
GetSystemTime
EnumCalendarInfoW
VirtualUnlock
CreateNamedPipeW
_lopen
GetShortPathNameA
ExpandEnvironmentStringsW
ExitThread
GetUserDefaultLCID
FindFirstFileA
FreeLibraryAndExitThread
GlobalAddAtomA
GetTapeParameters
_lclose
lstrcmpiA
WritePrivateProfileStringW
GetComputerNameW
FindFirstFileExW
GetSystemInfo
OpenMutexA
DosDateTimeToFileTime
lstrcpyA
Beep
GetDriveTypeW
GetDateFormatA
GetCurrentProcessId
VirtualAlloc
RaiseException
GetLongPathNameA
GetBinaryTypeW
FileTimeToLocalFileTime
EnumTimeFormatsW
CreateMutexA
CreateDirectoryW
SetCurrentDirectoryA
SetProcessShutdownParameters
GetProcessTimes
GetUserDefaultLangID
FlushFileBuffers
EnumResourceNamesW
SizeofResource
FatalAppExitA
CreateEventA
PurgeComm
SetCommMask
CompareStringA
OpenSemaphoreW
SetConsoleOutputCP
WriteProcessMemory
SetEndOfFile
GetPrivateProfileSectionW
GetHandleInformation
GetFileType
CloseHandle
ClearCommBreak
GetSystemTimeAsFileTime
SetupComm
GetVersionExA
EnumSystemCodePagesW
IsBadReadPtr
CompareStringW
GlobalDeleteAtom
GetPrivateProfileStringW
GetCommandLineA
lstrlenA
VirtualProtect
SetVolumeLabelA
ExitProcess
user32
GetKeyNameTextA
GetTitleBarInfo
GetSystemMenu
UnregisterClassA
GetTopWindow
SendMessageW
IsCharUpperW
InSendMessage
ValidateRgn
GetDlgItemInt
RegisterHotKey
CharUpperBuffA
GetKeyboardLayoutNameW
GetScrollRange
SetDlgItemTextA
SetRect
SendNotifyMessageW
SetCaretPos
wsprintfW
SetCapture
GetKeyState
CopyIcon
GetProcessWindowStation
CreateWindowExA
SendMessageCallbackW
AdjustWindowRect
CreateDialogIndirectParamA
comdlg32
GetFileTitleA
ReplaceTextA
ChooseColorW
advapi32
ControlService
MakeSelfRelativeSD
NotifyChangeEventLog
StartServiceA
IsValidAcl
SetSecurityDescriptorOwner
CryptDestroyHash
StartServiceCtrlDispatcherA
GetSecurityDescriptorDacl
oleaut32
SysAllocStringLen
SafeArrayUnaccessData
SysFreeString
SafeArrayRedim
SafeArrayGetElement
shlwapi
StrFormatByteSizeW
StrCpyW
StrCmpNW
SHAutoComplete
PathIsFileSpecA
StrChrA
SHGetValueA
StrRChrA
PathFileExistsA
StrChrIA
PathIsDirectoryA
SHCopyKeyW
SHRegCloseUSKey
PathCompactPathExW
PathIsRootA
Sections
.text Size: 332KB - Virtual size: 330KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE