Static task
static1
Behavioral task
behavioral1
Sample
29f49e5b51d85fa1e49468b02f68c1d0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
29f49e5b51d85fa1e49468b02f68c1d0_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
29f49e5b51d85fa1e49468b02f68c1d0_JaffaCakes118
-
Size
192KB
-
MD5
29f49e5b51d85fa1e49468b02f68c1d0
-
SHA1
3c9938694e116d304f776114ad671c67c3624144
-
SHA256
4014f90007d0e16d0681019488bec9de103219f07d2524c0980aead052bb153e
-
SHA512
a42282352b7d40ab7ce73b6a4b9118d2b9742c373abfd8b5d210229568467e90298cb36b912f90037a7ec38cc2642d7b10981e7a1d794615ae931f86847340ad
-
SSDEEP
3072:Ej+5uXuDwuv9QpxmqqnsZdysdJzTFywGbCZ9htR9Ea+DZgcF4:E9Yv9QpintsdHtADZv4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 29f49e5b51d85fa1e49468b02f68c1d0_JaffaCakes118
Files
-
29f49e5b51d85fa1e49468b02f68c1d0_JaffaCakes118.exe windows:4 windows x86 arch:x86
f52f9b2931b7fffa618f61746796e965
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
shlwapi
SHDeleteKeyA
kernel32
GetWindowsDirectoryA
lstrlenA
GetVersionExA
GetLastError
GetModuleFileNameA
CopyFileA
lstrcpyA
lstrcmpA
CreateFileA
ExitThread
ExitProcess
UnmapViewOfFile
GetSystemTime
MapViewOfFile
SetFileTime
GetFileTime
CreateFileMappingA
GetFileSize
SleepEx
CreateDirectoryA
RemoveDirectoryA
FindClose
Sleep
FindFirstFileA
SetEndOfFile
SetFilePointer
GetShortPathNameA
MoveFileExA
DeleteFileA
WriteFile
LocalFree
FormatMessageA
WideCharToMultiByte
GetModuleHandleA
SetCurrentDirectoryA
LocalAlloc
CreateProcessA
GetExitCodeThread
CreateThread
OpenProcess
HeapAlloc
GetProcessHeap
HeapFree
TerminateProcess
GetDiskFreeSpaceA
ResumeThread
SuspendThread
GetCurrentProcess
GetSystemDirectoryA
CreateMutexA
OpenMutexA
WaitForSingleObject
lstrcmpiA
ReleaseMutex
CloseHandle
LoadLibraryA
GetProcAddress
FreeLibrary
GetFileAttributesA
lstrcatA
MultiByteToWideChar
FindNextFileA
GetStartupInfoA
user32
MessageBoxA
wsprintfA
GetForegroundWindow
SendMessageA
SendDlgItemMessageA
EnableWindow
GetDlgItem
SetDlgItemTextA
PostQuitMessage
DispatchMessageA
TranslateMessage
SetWindowTextA
ShowWindow
LoadIconA
ExitWindowsEx
GetWindowLongA
SetWindowLongA
GetWindowRect
ScreenToClient
CreateWindowExA
CallWindowProcA
GetDlgItemTextA
DestroyWindow
DialogBoxParamA
CharUpperA
FindWindowA
CreateDialogParamA
EnumWindows
GetWindowThreadProcessId
GetWindowTextA
GetClientRect
SetWindowPos
GetMessageA
PostMessageA
advapi32
RegQueryValueExA
AdjustTokenPrivileges
OpenProcessToken
RegOpenKeyExA
RegEnumKeyA
RegQueryInfoKeyA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegEnumKeyExA
GetUserNameA
FreeSid
LookupPrivilegeValueA
shell32
SHBrowseForFolderA
SHGetMalloc
ShellExecuteExA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
SysAllocStringLen
SysFreeString
LoadTypeLibEx
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
sprintf
strtol
strcmp
strtoul
_itoa
memmove
strchr
strncpy
_ftol
memcpy
_splitpath
wcsstr
wcsncmp
wcscat
wcscpy
memset
free
malloc
memcmp
??2@YAPAXI@Z
??3@YAXPAX@Z
strstr
strrchr
strlen
strcat
strcpy
__CxxFrameHandler
_except_handler3
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ldata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE