Static task
static1
Behavioral task
behavioral1
Sample
5b3369f5495461519b683919408ddafe_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5b3369f5495461519b683919408ddafe_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5b3369f5495461519b683919408ddafe_JaffaCakes118
-
Size
398KB
-
MD5
5b3369f5495461519b683919408ddafe
-
SHA1
acf392fb3378e9b71d5faf84e46a941f86d386e4
-
SHA256
324a180075ea9ded06ab90eecd01d1afb8ae18adf2f640234edc81d2b8139f35
-
SHA512
608b955bd94a53dd060c326aed50ff6473e590626b903e6d1d8a7cc5a7894ad98a0906546338ec9f7474cff53370dc2264b89c6f2bbd0e930f93d3ee429c1b60
-
SSDEEP
12288:hVNWhx5+Dw4lXeZuPSIkFa+bxvLxkjTnmdjU:4hiBzbkFa+ZLefnm5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5b3369f5495461519b683919408ddafe_JaffaCakes118
Files
-
5b3369f5495461519b683919408ddafe_JaffaCakes118.exe windows:4 windows x86 arch:x86
7ee3ea019ee9ba8567eb0b99b19075ca
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteExA
SHFileOperationW
ShellExecuteEx
SHBrowseForFolderA
SHGetPathFromIDListA
comdlg32
PageSetupDlgW
GetFileTitleA
ReplaceTextW
GetOpenFileNameW
GetOpenFileNameA
GetFileTitleW
FindTextW
LoadAlterBitmap
ChooseColorW
FindTextA
PageSetupDlgA
ChooseColorA
GetSaveFileNameA
PrintDlgA
ChooseFontA
user32
GetListBoxInfo
GetWindowLongW
ToUnicode
LoadKeyboardLayoutW
SetDebugErrorLevel
DdeAbandonTransaction
DrawTextExW
GetMonitorInfoA
GetWindowDC
IsCharAlphaNumericW
wininet
InternetGoOnlineA
FtpGetFileA
InternetFortezzaCommand
HttpEndRequestW
InternetAutodial
GetUrlCacheConfigInfoA
InternetLockRequestFile
InternetQueryOptionA
ShowX509EncodedCertificate
InternetCanonicalizeUrlA
InternetWriteFileExW
InternetReadFile
SetUrlCacheGroupAttributeA
GetUrlCacheEntryInfoW
FindNextUrlCacheEntryA
GopherGetLocatorTypeA
InternetUnlockRequestFile
HttpOpenRequestW
FtpCommandW
GopherFindFirstFileA
InternetDial
RetrieveUrlCacheEntryFileW
FtpCreateDirectoryW
CreateUrlCacheContainerA
kernel32
GetSystemInfo
GetStringTypeA
CreateDirectoryExA
SetWaitableTimer
RtlUnwind
ReadConsoleInputA
CompareStringA
GetModuleFileNameW
LoadLibraryA
LCMapStringA
GetModuleFileNameA
GetFileType
FindNextFileW
VirtualAlloc
SetThreadAffinityMask
GetProcAddress
GetStdHandle
lstrcmp
TerminateProcess
SetEnvironmentVariableA
GetCurrentProcess
FileTimeToDosDateTime
UnhandledExceptionFilter
GetLocaleInfoW
HeapDestroy
ExitProcess
SetLocalTime
GetCurrentThread
VirtualFree
QueryPerformanceCounter
CompareStringW
InitializeCriticalSection
WriteFile
IsValidCodePage
GetEnvironmentStrings
TryEnterCriticalSection
GetStringTypeW
IsValidLocale
GetStartupInfoW
SetHandleCount
GetCommandLineA
IsBadReadPtr
GetCommandLineW
FreeEnvironmentStringsW
GetLocaleInfoA
HeapSize
HeapFree
CreateNamedPipeA
TlsGetValue
GetUserDefaultLCID
LeaveCriticalSection
GetCurrentProcessId
GetVersionExA
WideCharToMultiByte
GetEnvironmentStringsW
IsBadWritePtr
EnumSystemLocalesA
TlsAlloc
GlobalAddAtomA
SetLastError
GetCPInfo
MultiByteToWideChar
GetLastError
VirtualProtect
GetSystemTimeAsFileTime
EnterCriticalSection
GetStartupInfoA
HeapAlloc
GetOEMCP
InterlockedExchange
GetTimeFormatA
DeleteCriticalSection
GetThreadContext
GetTimeZoneInformation
GetDateFormatA
HeapCreate
GetCurrentThreadId
SetStdHandle
HeapReAlloc
GetACP
TlsSetValue
TlsFree
FreeEnvironmentStringsA
GetTickCount
GetModuleHandleA
WaitForMultipleObjectsEx
LCMapStringW
VirtualQuery
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 271KB - Virtual size: 282KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ