Static task
static1
Behavioral task
behavioral1
Sample
5a23db96e710ec1842472d035e9ae471_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5a23db96e710ec1842472d035e9ae471_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5a23db96e710ec1842472d035e9ae471_JaffaCakes118
-
Size
88KB
-
MD5
5a23db96e710ec1842472d035e9ae471
-
SHA1
4cc9158cfc567c7d58efbb2eaf66f2adfdbdec9b
-
SHA256
5bf7f8a7c630298baa2c41b30ffd5703b9cc562a64d71f2bab4d5942d622fe09
-
SHA512
cdb63e65b3302cae5104d4f5902878c08a312af0a2f6adb7ad893f765724e1e24fa8d3b048669805d5a08fdcb74f02f527a88002a157dcec81b7ce0311f6cf50
-
SSDEEP
1536:d4hQLCAim9mXijqPje5M8qrLTXDhnRcLxO98Bbn1l1Bu:dDWvm9ciM3PrLjDE7bn1l1Bu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5a23db96e710ec1842472d035e9ae471_JaffaCakes118
Files
-
5a23db96e710ec1842472d035e9ae471_JaffaCakes118.exe windows:4 windows x86 arch:x86
07b552467706fa0b61bc772e20b71352
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
OpenEventA
lstrlenA
LockResource
LoadResource
FindResourceA
lstrcpyA
lstrcatA
EnterCriticalSection
RaiseException
DeleteCriticalSection
HeapAlloc
GetProcessHeap
FlushInstructionCache
GetCurrentProcess
HeapFree
LeaveCriticalSection
InitializeCriticalSection
InterlockedIncrement
InterlockedDecrement
lstrlenW
GetModuleHandleA
MultiByteToWideChar
GetModuleFileNameA
GetLastError
WideCharToMultiByte
FreeLibrary
SizeofResource
LoadLibraryExA
lstrcmpiA
IsDBCSLeadByte
GetCurrentThreadId
FlushFileBuffers
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
SetFilePointer
GetCPInfo
GetOEMCP
LoadLibraryA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
WriteFile
HeapSize
VirtualFree
HeapCreate
CloseHandle
lstrcmpA
lstrcpynA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
HeapDestroy
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetCommandLineA
GetStartupInfoA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
RtlUnwind
HeapReAlloc
GetSystemTimeAsFileTime
ExitProcess
GetProcAddress
TerminateProcess
user32
IsDlgButtonChecked
EnableWindow
MessageBoxA
TranslateMessage
UnregisterClassA
CharNextA
RegisterWindowMessageA
GetWindowLongA
GetParent
GetWindow
GetDlgItem
SystemParametersInfoA
GetClientRect
MapWindowPoints
SetWindowPos
PeekMessageA
GetMessageA
GetWindowRect
DispatchMessageA
SetWindowLongA
CreateDialogParamA
DefWindowProcA
GetSystemMetrics
LoadImageA
SendMessageA
LoadStringA
KillTimer
ShowWindow
SetTimer
GetDlgItemTextA
SetDlgItemTextA
DestroyWindow
PostQuitMessage
advapi32
RegSetValueExA
RegQueryInfoKeyA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
shell32
ShellExecuteA
ole32
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
oleaut32
VarUI4FromStr
rasapi32
RasGetEntryDialParamsA
RasSetEntryDialParamsA
RasSetEntryPropertiesA
RasHangUpA
RasGetConnectStatusA
RasEnumDevicesA
RasGetEntryPropertiesA
RasEnumConnectionsA
RasDialA
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ