Static task
static1
Behavioral task
behavioral1
Sample
28ca5594261696a92ae48910e6e47794_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
28ca5594261696a92ae48910e6e47794_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
28ca5594261696a92ae48910e6e47794_JaffaCakes118
-
Size
328KB
-
MD5
28ca5594261696a92ae48910e6e47794
-
SHA1
6af1032f9ad688f023e255f6320c60a277d869d4
-
SHA256
d18b01a3cf3b8b063ffa17ffa1111310e660c1fcbf4a94c0001b220f307bba0c
-
SHA512
9bef67fa498d64b5855dc1f055623366c14c184453895e7abc96c402cf917976ae110c80245c064e72b2d7e86e371c9cfe3f04490383a94fbd01f75d8b61b783
-
SSDEEP
6144:8FU+1dhre6YAOBAwxvxHeVb/aGcX8tuGWehd4k8wOtc5sa0Ubsx:86od5e6sBLT+VzcstS0j8wBlzbsx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 28ca5594261696a92ae48910e6e47794_JaffaCakes118
Files
-
28ca5594261696a92ae48910e6e47794_JaffaCakes118.exe windows:4 windows x86 arch:x86
0a99988fbacd50675f6d2d993c899196
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
OpenProcess
GetProcessHeap
GetPrivateProfileStringA
CompareStringW
EraseTape
CreateIoCompletionPort
GetEnvironmentStrings
DeleteFiber
WritePrivateProfileStringA
GetCommConfig
GetProcessAffinityMask
_lwrite
FindCloseChangeNotification
DuplicateHandle
IsDBCSLeadByte
WaitForMultipleObjects
SetCommTimeouts
GetComputerNameA
GetVolumeInformationA
GetSystemInfo
OpenFileMappingW
CreateProcessW
GetPrivateProfileStructA
SystemTimeToTzSpecificLocalTime
CopyFileA
WriteFileEx
LeaveCriticalSection
GetConsoleCP
ReadFileScatter
lstrcpyA
lstrcatA
UnlockFile
GetThreadSelectorEntry
BackupRead
CreateMutexA
FindAtomW
IsBadWritePtr
TransactNamedPipe
FoldStringW
ReleaseSemaphore
GetNumberFormatA
GetThreadTimes
DeleteFileA
lstrcatW
VirtualAlloc
LockFile
GetDiskFreeSpaceExW
FreeEnvironmentStringsW
FormatMessageA
GetProfileStringA
WriteTapemark
OpenSemaphoreW
FlushConsoleInputBuffer
GetDiskFreeSpaceExA
DefineDosDeviceA
CreateMutexW
GetVersionExA
VirtualProtect
WriteProfileStringA
CreateSemaphoreW
EnterCriticalSection
GetCurrentProcess
GetTempFileNameA
GetModuleFileNameW
DeleteCriticalSection
FlushInstructionCache
CopyFileExW
AddAtomW
DeleteAtom
TlsSetValue
IsDBCSLeadByteEx
GetFileAttributesExW
GetPrivateProfileIntA
ExitThread
GetCommandLineA
WriteConsoleOutputCharacterA
DeviceIoControl
CreateDirectoryA
GetStdHandle
ExitProcess
user32
EqualRect
MenuItemFromPoint
ChildWindowFromPoint
LoadCursorFromFileW
GetClipboardFormatNameA
IsCharLowerA
CreateAcceleratorTableW
UnregisterClassA
PeekMessageW
DrawAnimatedRects
SetWindowPlacement
SendMessageTimeoutA
BroadcastSystemMessageA
SetTimer
CopyRect
ReleaseDC
gdi32
SetMetaFileBitsEx
RemoveFontResourceA
comdlg32
FindTextA
advapi32
DuplicateTokenEx
InitiateSystemShutdownW
RegisterEventSourceA
NotifyChangeEventLog
CryptSetKeyParam
ObjectCloseAuditAlarmW
DestroyPrivateObjectSecurity
RegUnLoadKeyW
NotifyBootConfigStatus
RegCreateKeyA
CryptSignHashW
RegisterEventSourceW
GetSidSubAuthority
shell32
SHGetFileInfoA
DoEnvironmentSubstW
ShellAboutW
ole32
StgIsStorageFile
oleaut32
VariantClear
LoadTypeLi
SysReAllocStringLen
comctl32
InitCommonControlsEx
ImageList_BeginDrag
PropertySheetA
ImageList_Duplicate
shlwapi
PathRelativePathToW
wvnsprintfW
PathGetDriveNumberW
SHEnumValueW
StrRChrA
SHOpenRegStream2W
StrDupW
PathFindFileNameW
SHRegQueryUSValueW
SHGetValueA
setupapi
SetupCommitFileQueueA
SetupDiGetClassDescriptionW
SetupDiSetDeviceInstallParamsA
SetupDiOpenDeviceInfoW
SetupDiDeleteDeviceInfo
SetupDiCreateDeviceInfoList
SetupPromptReboot
SetupTermDefaultQueueCallback
Sections
.text Size: 280KB - Virtual size: 278KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE