Static task
static1
Behavioral task
behavioral1
Sample
28ba2d21ed8a871c4afbaa57863f3ce5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
28ba2d21ed8a871c4afbaa57863f3ce5_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
28ba2d21ed8a871c4afbaa57863f3ce5_JaffaCakes118
-
Size
192KB
-
MD5
28ba2d21ed8a871c4afbaa57863f3ce5
-
SHA1
8943581971dc0f0198a4c224d27ea04578e23b4c
-
SHA256
b3f8824b1e0ae46eec59a487ec7a6a6704927bb0c27f82a69f6765f5aeea7d48
-
SHA512
3ae9ffd6d2a5eb8960b06b5ae8ccbbf3901fcbfeae57ae5ab67b1c06478987fe6c09dbb24ba40337f3c192d63bf536b5506020fc0e14e0a21c7f6184dcb999bf
-
SSDEEP
3072:kJSSB5+1jQBTjDB2XkUOoewtVwssKn7RwJYoalaQiQj6ut9jAIGteU6l1HyO/dF8:gSSbUUBTjDB0kqew4aZ39S/mD/k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 28ba2d21ed8a871c4afbaa57863f3ce5_JaffaCakes118
Files
-
28ba2d21ed8a871c4afbaa57863f3ce5_JaffaCakes118.exe windows:4 windows x86 arch:x86
5c1bad5623206f90b28ce1bf073c3942
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
RaiseException
GetLocaleInfoW
GetOEMCP
GetACP
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetStringTypeW
GetStringTypeA
WriteFile
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
SetStdHandle
UnhandledExceptionFilter
TerminateProcess
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidCodePage
IsValidLocale
GetCPInfo
ExitProcess
GetVersion
GetStartupInfoA
HeapAlloc
HeapFree
GetCommandLineA
LoadLibraryA
FreeLibrary
Sleep
RemoveDirectoryA
GetShortPathNameA
GetFileAttributesA
WritePrivateProfileStringA
lstrcmpA
FindNextFileA
MulDiv
GetModuleFileNameA
CreateFileMappingA
MapViewOfFile
FlushFileBuffers
ReadFile
UnmapViewOfFile
GetVersionExA
GetCurrentProcess
GetSystemDirectoryA
GetTempPathA
CreateDirectoryA
GetTempFileNameA
DeleteFileA
MoveFileExA
FindFirstFileA
FindClose
CreateFileA
GetLastError
CloseHandle
GetPrivateProfileIntA
GetModuleHandleA
GetProcAddress
GetSystemDefaultLCID
lstrcpyA
GetPrivateProfileStringA
lstrcatA
lstrlenA
GetLocaleInfoA
GetWindowsDirectoryA
SetThreadLocale
lstrcpynA
FreeEnvironmentStringsA
lstrcmpiA
user32
DispatchMessageA
CreateWindowExA
LoadIconA
FindWindowA
PostQuitMessage
DefWindowProcA
TranslateMessage
RemoveMenu
GetMessageA
MessageBoxA
IsDialogMessageA
GetSystemMenu
IsWindow
wsprintfA
SetWindowLongA
SendMessageA
PostMessageA
BeginPaint
EndPaint
GetUpdateRect
SetDlgItemTextA
DestroyWindow
CreateDialogParamA
ShowWindow
SystemParametersInfoA
GetWindowDC
OffsetRect
DrawTextA
GetSysColor
CopyRect
UpdateWindow
LoadCursorA
RegisterClassA
GetSystemMetrics
CharNextA
SetWindowTextA
SetWindowPos
GetDC
GetClientRect
ReleaseDC
InvalidateRect
GetWindowLongA
GetWindowRect
gdi32
CreateSolidBrush
Polygon
SelectClipRgn
ExtSelectClipRgn
CreatePatternBrush
CreateCompatibleDC
CreateCompatibleBitmap
SetStretchBltMode
StretchBlt
SetBkColor
BitBlt
SetTextColor
DeleteDC
GetDeviceCaps
CreateRectRgn
GetStockObject
SelectObject
DeleteObject
SetBkMode
CreatePalette
CreateDIBSection
CreateDIBitmap
RealizePalette
SelectPalette
SetBrushOrgEx
CreateFontA
GetTextColor
GetObjectA
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
shell32
FindExecutableA
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
lz32
LZClose
LZCopy
LZOpenFileA
Sections
.text Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 28KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.trdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE