Static task
static1
Behavioral task
behavioral1
Sample
328dd515d21e560d80a7ff0a2ad2533b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
328dd515d21e560d80a7ff0a2ad2533b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
328dd515d21e560d80a7ff0a2ad2533b_JaffaCakes118
-
Size
299KB
-
MD5
328dd515d21e560d80a7ff0a2ad2533b
-
SHA1
bc8402301b1fd8fa0038d40be69e7cc079bc70a6
-
SHA256
24d7cb6f9b8de1d2e4f92839f1bd09466e7dd0bbabcd1cb48917452839b7ce98
-
SHA512
8d4a07ba60c67a9c51fc8bc2c2516d6e0ecddaaa7a19e67d6cffb69e3e55ae5b403fe5fc177c53f9423cad0478cab34d52c972128b41294ac6ec48bf87fc9a6e
-
SSDEEP
6144:XhGuj/3HlbGa+0ubtnKmIJSI3MXRerPjLb0xGVwbt3d:XGainK0IWw30xGVm3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 328dd515d21e560d80a7ff0a2ad2533b_JaffaCakes118
Files
-
328dd515d21e560d80a7ff0a2ad2533b_JaffaCakes118.exe windows:4 windows x86 arch:x86
23a51c905c76323aa883914374e2be95
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetRgnBox
GetCharWidth32W
GetEnhMetaFilePaletteEntries
SetLayout
AngleArc
EnumFontsA
GetEnhMetaFileA
GetCharABCWidthsFloatA
RestoreDC
DeviceCapabilitiesExA
DeviceCapabilitiesExW
comdlg32
GetOpenFileNameW
GetOpenFileNameA
ReplaceTextW
ChooseColorA
user32
TranslateMDISysAccel
SendInput
GetScrollRange
ChangeDisplaySettingsA
GetUpdateRect
DlgDirSelectComboBoxExW
SystemParametersInfoW
RegisterClassExA
RegisterWindowMessageA
AppendMenuA
DrawFrameControl
GetClassInfoExA
DlgDirListComboBoxA
FillRect
RegisterClassA
advapi32
RegSetValueExA
LookupSecurityDescriptorPartsA
LookupAccountNameA
CryptGenRandom
RegLoadKeyW
CryptVerifySignatureA
LookupPrivilegeNameW
LookupAccountNameW
CryptGenKey
RegCreateKeyExW
wininet
UpdateUrlCacheContentPath
InternetQueryFortezzaStatus
InternetInitializeAutoProxyDll
InternetSetDialStateW
FtpDeleteFileA
HttpQueryInfoW
InternetCrackUrlA
kernel32
GetCurrentThread
GetModuleFileNameA
TlsAlloc
GetLocalTime
CompareStringA
FlushFileBuffers
GetProcAddress
GlobalFree
DeleteCriticalSection
InterlockedIncrement
GetStringTypeW
SetEnvironmentVariableA
OpenMutexA
CompareStringW
FreeEnvironmentStringsW
LoadLibraryA
GetVersion
SetStdHandle
GetEnvironmentStrings
QueryPerformanceCounter
GetLogicalDrives
GetModuleFileNameW
HeapCreate
HeapReAlloc
SetLastError
LeaveCriticalSection
WriteProfileSectionW
CreateMutexA
WriteConsoleOutputAttribute
CloseHandle
ReadFile
WriteConsoleInputA
GetCurrentProcessId
InterlockedDecrement
GetTempPathW
SetFilePointer
GetTimeZoneInformation
LCMapStringA
IsBadReadPtr
WriteFile
SetHandleCount
GetFileType
HeapAlloc
GetTickCount
GetStdHandle
IsBadWritePtr
HeapDestroy
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
TlsSetValue
TransmitCommChar
InitializeCriticalSection
GetACP
MultiByteToWideChar
GetCPInfo
VirtualAlloc
GetSystemTime
GetModuleHandleA
GetCurrentThreadId
LCMapStringW
CreateWaitableTimerW
VirtualQuery
VirtualFree
GetLastError
TerminateProcess
GetSystemTimeAsFileTime
TlsFree
RtlUnwind
FindFirstFileW
InterlockedExchange
ExitProcess
GetStartupInfoA
GetStringTypeA
TlsGetValue
FindAtomW
UnhandledExceptionFilter
FreeEnvironmentStringsA
WideCharToMultiByte
LocalUnlock
GetCommandLineA
GetEnvironmentStringsW
EnumResourceLanguagesW
GetCurrentProcess
GetOEMCP
GetThreadPriorityBoost
SetCriticalSectionSpinCount
GetFileAttributesW
HeapFree
VirtualProtectEx
comctl32
InitCommonControlsEx
Sections
.text Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 169KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ