Static task
static1
Behavioral task
behavioral1
Sample
5db0bcdcab1b1a07215d0f63718b4102_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5db0bcdcab1b1a07215d0f63718b4102_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5db0bcdcab1b1a07215d0f63718b4102_JaffaCakes118
-
Size
257KB
-
MD5
5db0bcdcab1b1a07215d0f63718b4102
-
SHA1
06be93eef280dc30c72d904e8101a417bbdd0e4a
-
SHA256
9933e416b7a70dd5e2f78e9e144e96ed1df8b205315184303d8265c071ebee6d
-
SHA512
abf2e3a73ee549452d686bff3dba53f1f7e755a80c64e6bbd422a81fa8191fca74bf5ce8c77c06125f85ea232596c42f4567cb385ec20417d3318797bcbb45c6
-
SSDEEP
6144:IdZOqpOODuHL/us9cYWGxIxRpxQL+kRiBChDp7MpxXTq2:EkODuHyseYW2IzT4R3ht7Mx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5db0bcdcab1b1a07215d0f63718b4102_JaffaCakes118
Files
-
5db0bcdcab1b1a07215d0f63718b4102_JaffaCakes118.exe windows:4 windows x86 arch:x86
9226372961b736e140670af607ea1b7c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeA
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
ExitProcess
GetSystemDirectoryW
GetLongPathNameW
GetCurrentThreadId
GetVersionExA
GetProcessHeap
GetLastError
TlsAlloc
GetCurrentThread
FileTimeToSystemTime
FileTimeToLocalFileTime
Sleep
GetEnvironmentVariableA
HeapCreate
GetStartupInfoA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
FreeLibrary
LoadLibraryA
InitializeCriticalSection
MultiByteToWideChar
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetStringTypeW
LoadLibraryW
GetLocaleInfoA
GetLocaleInfoW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatA
GetDateFormatA
Beep
GetDiskFreeSpaceA
GetLogicalDrives
SetErrorMode
GetFileAttributesA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetFullPathNameA
CreateDirectoryA
RemoveDirectoryA
GetFileAttributesW
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateDirectoryW
MoveFileW
RemoveDirectoryW
MoveFileA
RaiseException
GetExitCodeProcess
WaitForSingleObject
GetSystemInfo
DuplicateHandle
CreatePipe
SystemTimeToFileTime
BeginUpdateResourceW
GetProcAddress
security
SealMessage
CompleteAuthToken
user32
EnableWindow
CopyIcon
SetWindowLongW
CreateDialogIndirectParamA
LoadMenuW
DestroyCursor
TrackPopupMenuEx
RegisterWindowMessageA
GetMenuStringW
wsprintfW
CreateWindowExA
FindWindowW
GetMenuStringA
SetActiveWindow
IsWindow
GetMenuItemInfoA
SetFocus
OffsetRect
RegisterClassExA
WaitForInputIdle
gdi32
RemoveFontResourceExW
CreateColorSpaceW
GetTextExtentPointW
CreateScalableFontResourceW
CreateFontIndirectA
CreateFontW
CreateFontIndirectW
Sections
.text Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.F Size: 3KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aGH Size: 92KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.t Size: 4KB - Virtual size: 257KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pOIs Size: 2KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.XFP Size: 1KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Cvhg Size: 122KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ