Static task
static1
Behavioral task
behavioral1
Sample
313bbf593b166c5a50849e207309e4c1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
313bbf593b166c5a50849e207309e4c1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
313bbf593b166c5a50849e207309e4c1_JaffaCakes118
-
Size
168KB
-
MD5
313bbf593b166c5a50849e207309e4c1
-
SHA1
0168ac921d53fc5644f737256d993f66daba24a3
-
SHA256
5b2b4e136aae55def3f3ae313da0e933d88cf7977aa7763d97a0b0ffecd1b6a3
-
SHA512
a276a206c684457377bd4fe4ff2115c151cbb670b8c830feaa206c290632835b760c340b70784a8372937ee25a545fc53999d16c360047aa4af41c9cbcf9c260
-
SSDEEP
3072:h3agdPFr3+Xj9U7cYwPIefuUML6iJdYmfAuYZ0++QZRr8W6:pagRxuXxUoYeIefIL6M1A+Qj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 313bbf593b166c5a50849e207309e4c1_JaffaCakes118
Files
-
313bbf593b166c5a50849e207309e4c1_JaffaCakes118.exe windows:4 windows x86 arch:x86
8262b65b3bd2e7fca038ba4375962bf0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProfileStringA
GlobalUnlock
GlobalAlloc
GlobalLock
CreateFileA
GlobalFree
RtlZeroMemory
CreateThread
GetCPInfo
FlushFileBuffers
RaiseException
GetLocaleInfoA
LoadLibraryA
VirtualAlloc
GetStringTypeW
GetStringTypeA
GetProcAddress
LCMapStringW
LCMapStringA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
WriteFile
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetLastError
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetCurrentThreadId
DeleteCriticalSection
GetFileType
GetStdHandle
SetHandleCount
GetOEMCP
GetACP
GetModuleHandleA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedIncrement
InterlockedDecrement
ExitProcess
GetVersion
lstrlenA
GetCommandLineA
GetStartupInfoA
GetDriveTypeA
Sleep
MultiByteToWideChar
lstrcpyA
GetDiskFreeSpaceA
DeviceIoControl
lstrcmpiA
GetWindowsDirectoryA
lstrcatA
GetProcessHeap
HeapAlloc
SetFilePointer
GetLocaleInfoW
SetStdHandle
GetVolumeInformationA
WideCharToMultiByte
CloseHandle
HeapFree
lstrcmpA
user32
GetWindowTextA
MessageBoxA
LoadStringA
EnumWindows
SetForegroundWindow
RegisterClassA
DefDlgProcA
LoadIconA
LoadCursorA
WinHelpA
ShowWindow
SendDlgItemMessageA
GetWindowLongA
GetDlgItem
SetWindowLongA
SetDlgItemTextA
EndDialog
SetFocus
DialogBoxParamA
LoadBitmapA
FillRect
DrawTextA
UpdateWindow
GetDC
ReleaseDC
GetClientRect
DefWindowProcA
UnregisterClassA
SetTimer
LoadImageA
PostMessageA
wsprintfA
CreateDialogParamA
PeekMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
MsgWaitForMultipleObjects
DestroyWindow
CheckDlgButton
IsDlgButtonChecked
EnableWindow
GetDesktopWindow
GetWindowRect
MoveWindow
SetCursor
GetParent
InvalidateRect
CallWindowProcA
GetSysColor
DrawIconEx
DrawFocusRect
BeginPaint
EndPaint
SendMessageA
gdi32
CreateSolidBrush
BitBlt
DeleteDC
GetStockObject
GetObjectA
SelectObject
StretchBlt
SetBkMode
ExtTextOutA
CreateCompatibleDC
CreateBitmap
CreateCompatibleBitmap
SetBkColor
DeleteObject
GetTextExtentPoint32A
SetTextColor
advapi32
RegEnumValueA
RegDeleteValueA
RegSetValueExA
RegCloseKey
RegEnumKeyExA
RegQueryValueExA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegOpenKeyA
shell32
ExtractIconExA
ShellExecuteA
SHGetFileInfoA
ole32
CoTaskMemFree
CLSIDFromString
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemAlloc
comctl32
ord17
PropertySheetA
CreatePropertySheetPageA
shlwapi
StrStrIA
Sections
.text Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE