Static task
static1
Behavioral task
behavioral1
Sample
368e9b285eeccff0a6f7210d6b69eea2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
368e9b285eeccff0a6f7210d6b69eea2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
368e9b285eeccff0a6f7210d6b69eea2_JaffaCakes118
-
Size
288KB
-
MD5
368e9b285eeccff0a6f7210d6b69eea2
-
SHA1
7920fa881d267a2d480945d0f4d6498467087cb0
-
SHA256
e816ad09ae4fcd5ea516ba10b23992822a640553a502d9a218ab7e13526baafe
-
SHA512
f4e3ddabb0e8a8675daa3495a29f326c56f988ecca4134bd5391c5970d43f0edf8c86b340c890403e78f0998667d3274ea695f6c715267f2a361cb5286836b24
-
SSDEEP
6144:TpcgdmshB8DFuN3ks69hll7tKStKracMsiNZWPKz:T2gpj8Doas69lxKSfPN8K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 368e9b285eeccff0a6f7210d6b69eea2_JaffaCakes118
Files
-
368e9b285eeccff0a6f7210d6b69eea2_JaffaCakes118.exe windows:4 windows x86 arch:x86
3dc61fa8603de34b3983bf96cbbebc52
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
GetCurrentProcessId
FreeLibrary
GetPrivateProfileStringW
SuspendThread
ReadProcessMemory
MultiByteToWideChar
WaitForMultipleObjects
GlobalUnlock
GetFileAttributesW
InterlockedDecrement
ResumeThread
Sleep
SetEndOfFile
CreateWaitableTimerW
FindClose
WritePrivateProfileStringW
FindResourceExW
TerminateThread
SetWaitableTimer
CancelWaitableTimer
WriteFile
ExitProcess
GetProcessHeap
HeapAlloc
HeapFree
HeapSize
IsBadReadPtr
LoadLibraryA
VirtualProtect
FindResourceW
GlobalAlloc
MoveFileW
DuplicateHandle
GetCurrentThreadId
WaitForSingleObject
CreateFileW
FindFirstFileW
GetFileSize
GetSystemTime
CreateProcessW
SetLastError
VirtualFree
WideCharToMultiByte
SetFilePointer
GetVersion
GlobalFree
VirtualAlloc
GetFileAttributesExW
GetTickCount
lstrcpyW
FindNextChangeNotification
CreateEventW
LoadLibraryW
LockResource
GlobalLock
GetProcAddress
ReadFile
ResetEvent
FindNextFileW
GetLogicalDrives
user32
UpdateWindow
LoadCursorW
IsDlgButtonChecked
SetLayeredWindowAttributes
GetSysColor
GetMessageW
SetDlgItemTextW
LoadStringW
SystemParametersInfoW
PostThreadMessageW
GetWindowDC
DestroyIcon
VkKeyScanW
DrawTextW
GetKeyState
IsWindow
GetDlgItem
PostQuitMessage
wsprintfW
PostMessageW
GetParent
TranslateMessage
RegisterClassExW
SetCursor
GetWindowTextW
ReleaseCapture
SendMessageW
FillRect
OffsetRect
GetWindowRect
RedrawWindow
SendDlgItemMessageW
EnableWindow
CreateWindowExW
AppendMenuW
GetCursorPos
RegisterWindowMessageW
SetWindowTextW
SetWindowPos
LoadIconW
DefWindowProcW
LoadBitmapW
MessageBoxW
GetClassNameW
GetWindowThreadProcessId
DispatchMessageW
gdi32
GetObjectW
GetDeviceCaps
CreateFontIndirectW
SetBkColor
BitBlt
SelectObject
GetStockObject
CreateCompatibleBitmap
CreatePen
GetClipBox
SetTextColor
CreateDCW
CreateBitmap
SetBkMode
GetMapMode
CreateCompatibleDC
SetDIBits
DeleteObject
MoveToEx
LineTo
advapi32
SetSecurityDescriptorDacl
RegCreateKeyExW
GetUserNameW
RegDeleteValueW
RegNotifyChangeKeyValue
RegCloseKey
StartServiceW
LookupAccountSidW
RegOpenKeyExW
shell32
SHChangeNotify
Shell_NotifyIconW
ole32
CoInitializeEx
CoInitialize
CoUninitialize
oleaut32
OleLoadPicture
Sections
.text Size: 256KB - Virtual size: 253KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE