Static task
static1
Behavioral task
behavioral1
Sample
5c17ffc145ecb6f16f28062295385418_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5c17ffc145ecb6f16f28062295385418_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5c17ffc145ecb6f16f28062295385418_JaffaCakes118
-
Size
100KB
-
MD5
5c17ffc145ecb6f16f28062295385418
-
SHA1
d96e6b153f69835de9a9ea2b86a3ed861f14e9ea
-
SHA256
2c2e09a3529b3f953d768c7f14619f53b54721dee551f603d4aebecdd3916527
-
SHA512
e80e515df94a34f7842fe5787df76ecfc24e8e7c82842fba577692aad40887c635334739c8a3b0b03d33ecc65b9a3a4334fbfbd468ce6bdf51a0eded04afdd4b
-
SSDEEP
3072:7QZQw/yFeshtAcXD09lKjF3cuu0DmceHSSj:MC52eDQKjF3gkHS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5c17ffc145ecb6f16f28062295385418_JaffaCakes118
Files
-
5c17ffc145ecb6f16f28062295385418_JaffaCakes118.exe windows:4 windows x86 arch:x86
05af326955075a2fa90d5b7cb11d5d6c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumDateFormatsW
GetFullPathNameA
GetDriveTypeA
GetNumberFormatW
GetModuleHandleA
FreeEnvironmentStringsA
GetOEMCP
PeekNamedPipe
GetComputerNameW
SetLastError
GetBinaryTypeW
FlushConsoleInputBuffer
FormatMessageA
ClearCommBreak
GlobalAddAtomA
UnhandledExceptionFilter
IsBadStringPtrA
LCMapStringA
lstrcpyA
CreateMutexA
lstrcmpiA
GetUserDefaultLCID
SetEvent
VirtualUnlock
GetCompressedFileSizeW
EnumResourceNamesW
UnmapViewOfFile
SetProcessWorkingSetSize
SetHandleCount
SetConsoleTitleA
SwitchToFiber
ReadDirectoryChangesW
GetFileAttributesA
ConnectNamedPipe
LocalAlloc
EnumCalendarInfoW
GetFileInformationByHandle
GetPrivateProfileStringA
GetLogicalDriveStringsA
GetLongPathNameA
CreateProcessA
GetFileType
FillConsoleOutputCharacterA
GetConsoleMode
GetAtomNameA
SetProcessShutdownParameters
GlobalAddAtomW
DuplicateHandle
PulseEvent
AllocConsole
ExitProcess
user32
LoadAcceleratorsA
LockWindowUpdate
OemToCharA
TabbedTextOutW
ExitWindowsEx
CreateAcceleratorTableW
GetMenuItemInfoW
CharPrevA
ShowScrollBar
PostThreadMessageW
UnhookWinEvent
CharToOemBuffA
RegisterClassExA
SetWindowsHookExW
SetThreadDesktop
DrawAnimatedRects
GetMessagePos
ShowWindow
CopyAcceleratorTableA
IsCharLowerW
HiliteMenuItem
IsCharAlphaA
TabbedTextOutA
GetWindowInfo
GetUpdateRgn
DispatchMessageW
DestroyCaret
CreateWindowStationW
MoveWindow
MessageBoxW
FindWindowExW
LoadStringA
CreateIconFromResource
DefWindowProcA
CreateDesktopW
EnumDesktopsW
ToUnicode
CharLowerA
DrawStateA
GetKeyboardState
SendInput
GetSystemMetrics
SetScrollRange
SetUserObjectSecurity
GetMenuDefaultItem
IsCharUpperW
DestroyCursor
IsDlgButtonChecked
SetMenuDefaultItem
SetForegroundWindow
gdi32
GetPixelFormat
comdlg32
GetSaveFileNameW
advapi32
GetCurrentHwProfileW
CloseEventLog
CryptGenKey
BuildTrusteeWithNameW
StartServiceCtrlDispatcherW
CryptVerifySignatureW
AddAccessDeniedAce
InitiateSystemShutdownW
RegisterEventSourceW
ObjectDeleteAuditAlarmW
RegQueryInfoKeyW
RegDeleteValueA
CreateServiceA
RegOpenKeyA
CryptDestroyHash
LogonUserW
shell32
SHGetSettings
SHGetPathFromIDListA
oleaut32
LoadTypeLi
SafeArrayGetElement
SetErrorInfo
SysAllocStringLen
SysStringLen
SafeArrayGetLBound
comctl32
ImageList_LoadImageA
shlwapi
PathFindExtensionA
PathQuoteSpacesW
PathIsRelativeA
PathAddExtensionW
Sections
.text Size: 2KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE