Static task
static1
Behavioral task
behavioral1
Sample
26fce968df68329803a89a932e449530_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
26fce968df68329803a89a932e449530_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
26fce968df68329803a89a932e449530_JaffaCakes118
-
Size
332KB
-
MD5
26fce968df68329803a89a932e449530
-
SHA1
085c5fdea5a104c67ab3f9d37aa08e84c5938334
-
SHA256
a4550abc8c1f159e67d6ba8c29bd5b6ab00cee58cd21cbd06aa2ae865b743c0c
-
SHA512
08a6fa76de6b34ed87ad49ad5da55ae902342361ce138e7dddb799529c47ea3af67cd075ab13ae69c1e2628d10d14e4bfd1bb680b0f6b138b5f0385a89eca432
-
SSDEEP
6144:YWRzew2VhrqbZ1vWTDCzbtb7IsQF3jSQuwJkVBRr/QTaQb9Fo8reJaD3CHh3EZTZ:LRzmVhWZ1vIebl7HwuQ9JkVToTzbbo8l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 26fce968df68329803a89a932e449530_JaffaCakes118
Files
-
26fce968df68329803a89a932e449530_JaffaCakes118.exe windows:4 windows x86 arch:x86
c630b0ae13780ef43cf02838ba445579
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
PeekConsoleInputW
CreateThread
EndUpdateResourceA
GetHandleInformation
GetCompressedFileSizeA
CreateWaitableTimerW
SetEvent
SetSystemTime
GetCompressedFileSizeW
VirtualLock
LCMapStringA
HeapReAlloc
FindFirstChangeNotificationW
WriteFile
GetBinaryTypeW
LocalUnlock
GetConsoleTitleA
TryEnterCriticalSection
GetComputerNameW
GetCommState
_llseek
PulseEvent
FillConsoleOutputCharacterW
CreateEventW
ResumeThread
SetVolumeLabelA
CreateEventA
FileTimeToSystemTime
CancelWaitableTimer
lstrlenW
GetProcAddress
ExitProcess
ReadConsoleA
DebugBreak
CreateSemaphoreA
GetTickCount
GetThreadContext
OpenFileMappingA
GetComputerNameA
CopyFileW
GetBinaryTypeA
Sleep
WaitForMultipleObjects
CreateMailslotW
OutputDebugStringA
ExitThread
SetFileTime
MultiByteToWideChar
GetCommandLineA
lstrlenA
GetVersionExA
user32
ModifyMenuW
SendNotifyMessageW
IsDialogMessageA
MapVirtualKeyW
CreateDialogIndirectParamW
DeleteMenu
LoadImageA
GetKeyState
ShowScrollBar
GetCaretBlinkTime
DefWindowProcA
CharLowerBuffA
RegisterClipboardFormatW
InvalidateRgn
GetScrollPos
FindWindowExW
GetWindowTextA
CreateCaret
OpenWindowStationW
IsWindow
GetSystemMenu
GetNextDlgTabItem
EnumDisplaySettingsW
IsChild
ChildWindowFromPoint
UnregisterDeviceNotification
GetShellWindow
gdi32
PlayMetaFileRecord
GetRegionData
SetPixelFormat
PaintRgn
PlayMetaFile
CreatePolygonRgn
GetBkColor
GetTextExtentPoint32W
MaskBlt
SetBitmapBits
GetEnhMetaFileDescriptionA
ResizePalette
GetBitmapBits
Escape
GetNearestColor
SetWinMetaFileBits
GetTextExtentExPointW
SetViewportOrgEx
comdlg32
ChooseColorW
PageSetupDlgW
advapi32
StartServiceCtrlDispatcherA
RegCreateKeyExA
GetFileSecurityW
SetSecurityDescriptorOwner
SetFileSecurityW
GetTokenInformation
ReportEventA
GetSecurityDescriptorOwner
BuildTrusteeWithNameW
StartServiceCtrlDispatcherW
EnumDependentServicesA
ReportEventW
CryptVerifySignatureA
ObjectDeleteAuditAlarmW
SetNamedSecurityInfoA
SetTokenInformation
OpenServiceA
GetSecurityInfo
CryptGetUserKey
SetSecurityInfo
SetFileSecurityA
SetThreadToken
RegConnectRegistryA
IsValidSecurityDescriptor
RevertToSelf
QueryServiceObjectSecurity
RegCloseKey
RegSetValueA
IsValidAcl
CryptSetProvParam
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
SHAppBarMessage
SHAddToRecentDocs
ole32
StgCreateDocfile
SetConvertStg
ReadFmtUserTypeStg
OleCreateLink
CoRegisterMallocSpy
OleTranslateAccelerator
oleaut32
SysAllocString
SafeArrayRedim
GetErrorInfo
RegisterTypeLi
SafeArrayPutElement
SafeArrayGetElement
VariantCopy
CreateErrorInfo
shlwapi
UrlGetPartA
ChrCmpIW
StrChrIA
SHRegGetBoolUSValueA
PathParseIconLocationW
StrFormatByteSize64A
PathIsRootA
PathAddBackslashA
setupapi
SetupDiClassGuidsFromNameW
Sections
.text Size: 276KB - Virtual size: 272KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE