Static task
static1
Behavioral task
behavioral1
Sample
5d10807b5742bebf56d776970e70b256_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5d10807b5742bebf56d776970e70b256_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5d10807b5742bebf56d776970e70b256_JaffaCakes118
-
Size
355KB
-
MD5
5d10807b5742bebf56d776970e70b256
-
SHA1
9e63fb5770c4d146658663e2300d301465cc5e49
-
SHA256
9610920baa6472e243f4195126def3a4696581892b5e228745f89c36671aebdb
-
SHA512
14f13fb008e1ff1d6ed97a461c9d2b4d2ea92b5c60576fed1af5ac335bef2cf02f7c0c4cfc0b68a87b2c3ad819ca76afc63d08c856752cd40e899733736a69da
-
SSDEEP
6144:6CkrmfADumwW0UK0B9FUC/pWZMekDXVve618lre0EvCfT0O6T5jKhmCfyEb:6Ck69mwWvBDUC/h18lrCLL1j2mCfXb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5d10807b5742bebf56d776970e70b256_JaffaCakes118
Files
-
5d10807b5742bebf56d776970e70b256_JaffaCakes118.exe windows:4 windows x86 arch:x86
86ca51c035c98b0755c8533c15ad9a72
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
user32
MessageBoxA
GetClassInfoA
DestroyWindow
LoadCursorA
DispatchMessageA
FindWindowA
ClientToScreen
SetCursorPos
SendMessageA
GetAsyncKeyState
SetWindowPos
DefWindowProcA
DrawTextA
IsWindowVisible
IsIconic
GetDC
ReleaseDC
UnregisterHotKey
RegisterHotKey
GetCursorPos
ScreenToClient
WaitMessage
ShowCursor
PeekMessageA
TranslateMessage
GetSystemMetrics
GetWindowRect
LoadIconA
RegisterClassA
GetDesktopWindow
GetClientRect
CreateWindowExA
UpdateWindow
ShowWindow
PostQuitMessage
UnregisterClassA
wsprintfA
SetFocus
GetParent
SetWindowPlacement
AdjustWindowRectEx
GetWindowLongA
GetMenu
GetWindowPlacement
SetCursor
gdi32
StretchBlt
GetStockObject
CreateFontIndirectA
SetBkMode
SelectObject
SetTextColor
DeleteObject
GetDeviceCaps
GetPaletteEntries
advapi32
RegSetValueExA
RegOpenKeyA
RegCloseKey
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
ole32
CoInitialize
CoCreateInstance
ddraw
DirectDrawCreateEx
DirectDrawEnumerateExA
winmm
timeGetTime
kernel32
IsBadCodePtr
FlushFileBuffers
SetStdHandle
SetUnhandledExceptionFilter
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetTimeZoneInformation
ReadFile
SetFilePointer
GetFileType
GetStdHandle
SetHandleCount
WriteFile
IsBadWritePtr
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
SetEndOfFile
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
CompareStringA
CompareStringW
VirtualFree
HeapCreate
HeapDestroy
RaiseException
GetVersion
GetStartupInfoA
CreateProcessA
SetEnvironmentVariableA
UnhandledExceptionFilter
WaitForSingleObject
GetExitCodeProcess
QueryPerformanceFrequency
GetTickCount
GetCommandLineA
GetSystemDirectoryA
GetProfileStringA
MultiByteToWideChar
WritePrivateProfileStringA
GetLastError
GetShortPathNameA
QueryPerformanceCounter
Sleep
GetModuleFileNameA
IsBadReadPtr
GetModuleHandleA
GetProcAddress
LoadLibraryA
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
UnmapViewOfFile
CloseHandle
DeleteFileA
GetVersionExA
GetWindowsDirectoryA
HeapFree
HeapAlloc
RtlUnwind
HeapReAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
GetFileAttributesA
FindFirstFileA
FindNextFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
CreateDirectoryA
Sections
.text Size: 196KB - Virtual size: 194KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ