Static task
static1
Behavioral task
behavioral1
Sample
422f71b4cf8084e2a916da34ffe10052_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
422f71b4cf8084e2a916da34ffe10052_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
422f71b4cf8084e2a916da34ffe10052_JaffaCakes118
-
Size
60KB
-
MD5
422f71b4cf8084e2a916da34ffe10052
-
SHA1
87c8bca7e9d3e1e4a119431ec2ba33b66f270a14
-
SHA256
857f83caa4910f8f160b0228be61252318bfad61c519a5afa20ca8ea885c113b
-
SHA512
03ab85d41ef4d3d72f898addd9ece3366a738b50589209c4e8c3fb69aff76475ddb102c0e56981244fe545c1e298ecf72fd347a51feb4cec0e469bc8651ad716
-
SSDEEP
768:Msj44SFkaaLPP+GizfclAzfvy1NQ/H8Y09OiJos/:p44xeGYnzfvy1NQfxios
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 422f71b4cf8084e2a916da34ffe10052_JaffaCakes118
Files
-
422f71b4cf8084e2a916da34ffe10052_JaffaCakes118.exe windows:4 windows x86 arch:x86
5a00e2b9746e702178568c8d65964e11
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
DeleteFileA
CloseHandle
FindFirstFileA
OutputDebugStringA
GetCurrentDirectoryA
SetStdHandle
ReadFile
FlushFileBuffers
GetProcAddress
LoadLibraryA
VirtualAlloc
HeapAlloc
HeapReAlloc
LCMapStringW
LCMapStringA
SetFilePointer
GetACP
GetCPInfo
GetOEMCP
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
RtlUnwind
HeapFree
WriteFile
HeapCreate
HeapDestroy
VirtualFree
GetStdHandle
SetHandleCount
GetPrivateProfileStringA
GetFileType
WritePrivateProfileStringA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsA
GetLastError
GetModuleHandleA
GetPrivateProfileIntA
GlobalAlloc
GetSystemDefaultLangID
GetVersionExA
GetWindowsDirectoryA
GetSystemDirectoryA
GetModuleFileNameA
SetCurrentDirectoryA
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetCommandLineA
SetEnvironmentVariableA
GetCurrentProcess
GetStartupInfoA
ExitProcess
GetVersion
TerminateProcess
user32
LoadCursorA
ReleaseDC
wsprintfA
MessageBoxA
SetCursor
GetDC
GetDesktopWindow
InvalidateRect
PtInRect
UpdateWindow
SetRect
DialogBoxParamA
PostQuitMessage
GetClientRect
GetSystemMetrics
DestroyWindow
DefWindowProcA
GetMessageA
CreateWindowExA
RegisterClassExA
GetDlgItem
TranslateMessage
DispatchMessageA
SendMessageA
SetWindowTextA
ShowWindow
IsDlgButtonChecked
BeginPaint
EndPaint
LoadImageA
EndDialog
gdi32
CreateCompatibleDC
GetStockObject
SetBkMode
GetDeviceCaps
GetObjectA
DeleteObject
DeleteDC
TextOutA
BitBlt
SetTextColor
CreateFontIndirectA
SelectObject
advapi32
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
shell32
ShellExecuteA
Sections
.text Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 331KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 4KB - Virtual size: 11B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE