Static task
static1
Behavioral task
behavioral1
Sample
365a17f4201657e177d1870db075b84e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
365a17f4201657e177d1870db075b84e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
365a17f4201657e177d1870db075b84e_JaffaCakes118
-
Size
260KB
-
MD5
365a17f4201657e177d1870db075b84e
-
SHA1
aaa539d02ffb6026d00c23a5a6363ae4e985f665
-
SHA256
e97dd1730d7f2128c01600a9c40b4710c85bf4ac8ba06748896aad7b21a29233
-
SHA512
714edbcfab5a741b9c46676a863a224fee9b1d5ec9087ab5d2dca739bec48ca654a622dd90647ad47e4e97f411312b61e6c6a3aa9df91ec2882fe012fed45b23
-
SSDEEP
6144:hJGfOvTmUwYOLYAldVwxSd+LCWmNibWgW3I:h4foUYfAldVwx5LFmIhW4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 365a17f4201657e177d1870db075b84e_JaffaCakes118
Files
-
365a17f4201657e177d1870db075b84e_JaffaCakes118.exe windows:4 windows x86 arch:x86
44ff48658e712eb7e94653b8438446d7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryW
GetFileAttributesW
GetModuleFileNameW
GetTempPathW
GetLastError
LocalAlloc
GetCurrentThread
OpenEventW
GetWindowsDirectoryW
LocalFree
lstrcpynW
WaitForSingleObject
SetEvent
InitializeCriticalSection
Sleep
CreateEventW
FreeLibrary
SetErrorMode
LoadLibraryW
CreateDirectoryW
GetCurrentProcess
lstrlenW
MultiByteToWideChar
lstrlenA
GetExitCodeProcess
MoveFileW
CreateMutexW
ExpandEnvironmentStringsW
ExpandEnvironmentStringsA
LoadLibraryA
RemoveDirectoryW
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
Beep
GetVersionExW
GetModuleHandleW
BeginUpdateResourceW
GetProcAddress
user32
GetForegroundWindow
MoveWindow
IsWindow
GetTopWindow
MessageBeep
PostMessageW
OffsetRect
RegisterWindowMessageW
InvalidateRect
DestroyIcon
SetWindowPos
SendMessageW
EnableWindow
gdi32
CreateFontIndirectW
CreateFontW
DeleteObject
CreatePatternBrush
CreateSolidBrush
advapi32
FreeSid
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyExW
OpenServiceW
QueryServiceStatus
OpenSCManagerW
CloseServiceHandle
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
GetUserNameW
GetLengthSid
IsValidSecurityDescriptor
RevertToSelf
AddAccessAllowedAce
SetSecurityDescriptorOwner
AllocateAndInitializeSid
OpenProcessToken
OpenThreadToken
SetSecurityDescriptorGroup
AccessCheck
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
ImpersonateSelf
InitializeAcl
shell32
SHGetSpecialFolderLocation
ShellExecuteW
SHBrowseForFolderW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
ole32
CoCreateInstance
mapistub
MAPIInitialize
DllGetClassObject
OpenStreamOnFile
cmc_read
BMAPISendMail
cmc_logoff
BMAPIFindNext
MAPIOpenLocalFormContainer
kbdcz1
KbdLayerDescriptor
Sections
.edata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 4KB - Virtual size: 466KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 99KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 1KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 317KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 120KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ