Static task
static1
Behavioral task
behavioral1
Sample
36ef994255e295f849dda8b21603e13a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
36ef994255e295f849dda8b21603e13a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
36ef994255e295f849dda8b21603e13a_JaffaCakes118
-
Size
1.7MB
-
MD5
36ef994255e295f849dda8b21603e13a
-
SHA1
a5a7f7114e379eaff17a27611f51123aacce22e6
-
SHA256
a44b8e65c92178fa34c3cf81947bea45278d1f6c04c6bdbb2a2b04004fddc4e7
-
SHA512
a0458b639169579019ff6ef828af0cc1a8259e08dbca5df701206cd3c4f7ba62fd8d6131dc6e3c2d3adfcf4309773bc212bd40461333238faa43dbacb9eee032
-
SSDEEP
24576:HS3zozmw1n2z4Psp5KKvWzJWUi+4NJfRnujH45wf/ULosy2xWWpOKVEqzoCuDdg0:/Uz4EpUdJWUi+4/5CzP4jOSiDOUHhkBw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 36ef994255e295f849dda8b21603e13a_JaffaCakes118
Files
-
36ef994255e295f849dda8b21603e13a_JaffaCakes118.exe windows:4 windows x86 arch:x86
f82ad31b4d63082b50c9f9f3441f4120
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
MoveFileExA
GetCurrentProcess
GetDriveTypeA
GetModuleFileNameA
GetVersionExA
GetVersion
CompareStringA
GetTimeZoneInformation
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
FormatMessageA
LCMapStringW
LCMapStringA
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetCommandLineA
GetStartupInfoA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
RemoveDirectoryA
MoveFileA
RtlUnwind
DeleteFileA
SetEnvironmentVariableA
CreateDirectoryA
HeapFree
HeapAlloc
HeapCompact
TerminateProcess
ExitProcess
CopyFileA
SetFileTime
OpenFile
GetFileAttributesA
SetFileAttributesA
SetErrorMode
GetPrivateProfileStringA
WritePrivateProfileStringA
LoadLibraryExA
FindResourceA
GetTickCount
GetFullPathNameA
MultiByteToWideChar
WideCharToMultiByte
GetLocalTime
GetTempPathA
GetShortPathNameA
GetExitCodeProcess
CompareStringW
GetCurrentDirectoryA
SetCurrentDirectoryA
CreateProcessA
Sleep
lstrcatA
lstrlenA
WinExec
LoadLibraryA
GetProcAddress
FreeLibrary
GetDiskFreeSpaceA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
CloseHandle
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetLastError
FindFirstFileA
FindClose
GetWindowsDirectoryA
GetCPInfo
GetSystemDirectoryA
user32
ExitWindowsEx
IsIconic
PostQuitMessage
DefWindowProcA
AdjustWindowRectEx
DialogBoxParamA
EndDialog
CheckDlgButton
SetTimer
KillTimer
SendDlgItemMessageA
GetFocus
BringWindowToTop
GetLastActivePopup
SendMessageA
GetWindow
FindWindowA
LoadCursorA
LoadIconA
PostMessageA
GetSysColor
ScreenToClient
GetWindowRect
GetDlgItem
EndPaint
BeginPaint
GetClientRect
FillRect
DrawTextA
GetSystemMetrics
GetDlgItemTextA
IsClipboardFormatAvailable
OpenClipboard
GetClipboardData
CloseClipboard
IsDlgButtonChecked
CheckRadioButton
SetFocus
GetParent
UpdateWindow
IsWindowVisible
InvalidateRect
CreateDialogParamA
RedrawWindow
PeekMessageA
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
SetDlgItemTextA
SetWindowTextA
SetWindowPos
ShowWindow
DestroyWindow
CreateWindowExA
GetWindowLongA
IsWindowEnabled
CallWindowProcA
ValidateRect
SetWindowLongA
GetClassNameA
MessageBoxA
EnableWindow
SendMessageTimeoutA
wsprintfA
RegisterClassA
gdi32
CreatePalette
SetBkColor
ExtTextOutA
GetSystemPaletteEntries
AddFontResourceA
RemoveFontResourceA
GetStockObject
GetDeviceCaps
DeleteDC
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
RealizePalette
SelectPalette
CreateHalftonePalette
CreateDIBPatternBrush
CreateSolidBrush
SetBrushOrgEx
SetStretchBltMode
StretchDIBits
CreateFontIndirectA
SetBkMode
SetTextColor
comdlg32
GetOpenFileNameA
advapi32
RegDeleteKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
RegCreateKeyA
RegEnumKeyExA
RegCloseKey
RegDeleteValueA
RegOpenKeyA
RegSetValueExA
RegQueryValueA
RegOpenKeyExA
RegQueryValueExA
shell32
DragQueryFileA
DragFinish
ShellExecuteA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
DragAcceptFiles
ole32
CoGetMalloc
CoCreateInstance
OleInitialize
OleUninitialize
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
VerFindFileA
comctl32
ord17
Sections
.text Size: 136KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ