Static task
static1
Behavioral task
behavioral1
Sample
5a359d8ab92a12a432a2a996a98f715f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5a359d8ab92a12a432a2a996a98f715f_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
5a359d8ab92a12a432a2a996a98f715f_JaffaCakes118
-
Size
878KB
-
MD5
5a359d8ab92a12a432a2a996a98f715f
-
SHA1
d82bdfc2a6822ec1e53d76429342dbe5656de2c7
-
SHA256
112be752a3c02dcceb794465f3e860972ff90312be8a1cd4f73887d200c05971
-
SHA512
a4b56aa9e0b81eac70e292a2fd3bed088804079f14d985de001e9b1e9b13c542abaaaf4fe4d3463cdbd999555888325fbe71a5ff11565f11e1cd1bf9c7d36bbd
-
SSDEEP
12288:yW787HOYzZSLlaUFe1OYpSX8eBfjRgeYlSC6WLmg99WeDCyyrZPBju/F8MwN:OLOYzZSLlawX8ayaCzr94eDYLju/NwN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5a359d8ab92a12a432a2a996a98f715f_JaffaCakes118
Files
-
5a359d8ab92a12a432a2a996a98f715f_JaffaCakes118.exe windows:4 windows x86 arch:x86
673df7b0350ff14f47dddf1eb227eb7a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_DragEnter
DestroyPropertySheetPage
ImageList_GetBkColor
ImageList_Draw
user32
DefMDIChildProcA
ShowScrollBar
GetClipboardSequenceNumber
CheckDlgButton
CloseWindowStation
OpenIcon
EmptyClipboard
GetMenuStringA
DestroyCaret
GetMessageExtraInfo
GetWindowWord
GetClipboardFormatNameA
OpenDesktopA
ChangeClipboardChain
GetMenuItemRect
OpenClipboard
VkKeyScanA
IsCharLowerW
EnumWindowStationsA
kernel32
GetProcessHeap
GetCompressedFileSizeW
ExitProcess
GlobalFlags
GetOEMCP
WritePrivateProfileStringA
WriteFile
ExitThread
LeaveCriticalSection
SetConsoleOutputCP
GetBinaryTypeA
_llseek
IsProcessorFeaturePresent
GenerateConsoleCtrlEvent
QueryDosDeviceW
GetProcessTimes
FreeResource
EraseTape
GetModuleFileNameW
DeleteFiber
GlobalAddAtomW
LCMapStringA
SetConsoleCursorPosition
GlobalAddAtomA
GetACP
CreateProcessA
EnumSystemCodePagesW
WriteConsoleOutputCharacterA
GetVersion
UnhandledExceptionFilter
GetEnvironmentStringsW
GetTimeZoneInformation
GetAtomNameA
GetLocaleInfoW
SetEvent
LocalReAlloc
SetConsoleTitleA
ReadFile
GetBinaryTypeW
EnumCalendarInfoW
GetSystemTimeAsFileTime
lstrcpynA
DeleteCriticalSection
advapi32
ObjectCloseAuditAlarmA
RegFlushKey
RegCreateKeyW
CryptExportKey
QueryServiceLockStatusW
RegQueryValueExA
StartServiceCtrlDispatcherA
StartServiceA
ReportEventW
LookupPrivilegeDisplayNameA
CryptReleaseContext
SetNamedSecurityInfoW
RegUnLoadKeyA
CopySid
SetSecurityDescriptorSacl
UnlockServiceDatabase
msvcrt
_mbsdec
perror
_wtol
_snwprintf
fread
_setmode
_getdcwd
_lseeki64
_beginthread
wcscoll
_itoa
wscanf
_ui64tow
_mbsrchr
_strdup
_chmod
_mbctoupper
mktime
_stricoll
_wsetlocale
ftell
_wstrdate
_controlfp
_isctype
iswxdigit
Sections
.text Size: 11KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 597KB - Virtual size: 596KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ