Static task
static1
Behavioral task
behavioral1
Sample
32058a55b702f2a60b70ca8039b0feeb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
32058a55b702f2a60b70ca8039b0feeb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
32058a55b702f2a60b70ca8039b0feeb_JaffaCakes118
-
Size
244KB
-
MD5
32058a55b702f2a60b70ca8039b0feeb
-
SHA1
5745fef8d2206567e1c12c92145742ee791e9e4b
-
SHA256
4ccacdc6a01fc424b9c2501a3479478b3a03418e068fe076f1d204517f7e516e
-
SHA512
85d372c0879a0d986b1d76daa483f2cb92a42603162f00db378c7e1716cd142014e82d398ca8e43887b95295151517fe4c32f719eca8498317caed80b721dcc3
-
SSDEEP
3072:epRj/6szNcbRbe0H/d9mh/9a2Ljwn/b7dg+drc/1JSvjh2ovloqSy4v/YuJmi1:arQjlEh/c2LjwXlM1ov3bHA/Yux
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 32058a55b702f2a60b70ca8039b0feeb_JaffaCakes118
Files
-
32058a55b702f2a60b70ca8039b0feeb_JaffaCakes118.exe windows:4 windows x86 arch:x86
af61c3f6086bf0420ef2c9aaf673ae33
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
CreateEventA
Module32Next
Module32First
LocalFree
FormatMessageA
CreateMutexA
OpenMutexA
FreeEnvironmentStringsW
CreateThread
GetCurrentThread
SetEnvironmentVariableA
MulDiv
LocalAlloc
WriteFile
ReadFile
GetFileSize
CreateToolhelp32Snapshot
GetCurrentProcessId
RaiseException
CompareStringW
CompareStringA
GetOEMCP
GetACP
GetCPInfo
lstrlenA
LoadLibraryA
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
SetStdHandle
FlushFileBuffers
SetFilePointer
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
Process32First
Process32Next
CloseHandle
CreateFileA
ResetEvent
GetCurrentProcess
DuplicateHandle
GetLastError
OutputDebugStringA
SuspendThread
CreateProcessA
ResumeThread
WriteProcessMemory
OpenProcess
ReadProcessMemory
SetCurrentDirectoryA
GetModuleFileNameA
GetCurrentDirectoryA
FindFirstFileA
FindClose
TerminateProcess
Sleep
GetEnvironmentStrings
FreeEnvironmentStringsA
GetProcAddress
GetTickCount
GetStringTypeW
GetExitCodeProcess
WaitForMultipleObjectsEx
DeleteFileA
SetFileAttributesA
FindNextFileA
MoveFileA
RemoveDirectoryA
FreeLibrary
FileTimeToDosDateTime
GetSystemTimeAsFileTime
GetFileAttributesA
CreateDirectoryA
GetVersion
HeapFree
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
SetEndOfFile
InterlockedDecrement
InterlockedIncrement
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
RtlUnwind
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
WideCharToMultiByte
user32
SetForegroundWindow
LoadIconA
RegisterClassExA
CreateWindowExA
UpdateWindow
PeekMessageA
TranslateMessage
DispatchMessageA
BeginPaint
EndPaint
DefWindowProcA
GetClientRect
LoadCursorA
SetCursor
SendMessageA
SetWindowTextA
MessageBeep
GetWindowRect
IsWindowVisible
ShowWindow
EnumWindows
BringWindowToTop
AdjustWindowRectEx
IsIconic
SystemParametersInfoA
MoveWindow
MessageBoxA
GetDesktopWindow
GetActiveWindow
PostMessageA
GetTabbedTextExtentA
GetDC
ReleaseDC
wsprintfA
GetForegroundWindow
GetWindowThreadProcessId
GetWindowLongA
EnumThreadWindows
SendMessageTimeoutA
gdi32
LPtoDP
SetTextColor
TextOutA
CreateFontA
DeleteObject
CreateDIBSection
Rectangle
CreatePen
CreateSolidBrush
DeleteDC
CreateCompatibleDC
BitBlt
GetObjectA
SetBkMode
SelectObject
advapi32
CryptDestroyHash
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptImportKey
CryptVerifySignatureA
CryptDestroyKey
CryptReleaseContext
winmm
timeGetTime
imagehlp
MapAndLoad
UnMapAndLoad
comctl32
_TrackMouseEvent
Sections
.text Size: 156KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 36KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ