Static task
static1
Behavioral task
behavioral1
Sample
603026cd53e1deb722d14d6f7bf21b8e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
603026cd53e1deb722d14d6f7bf21b8e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
603026cd53e1deb722d14d6f7bf21b8e_JaffaCakes118
-
Size
168KB
-
MD5
603026cd53e1deb722d14d6f7bf21b8e
-
SHA1
e0d814a628c81d6188dae8e193edd60214b79862
-
SHA256
9d5d2a1edd33e93feb9e065eaad7401711fa993af4a0549d911029f3f91ab717
-
SHA512
7a9179924345a90742194f9b6f072f5a955b43939a536d77215289105791e7c5acc294658951f5b6add150f7d7ed485e0d35de7a8c1a498455c0b416a4c3737a
-
SSDEEP
3072:2r/G45QDDslQjZN0SZGhRxF5qPqgJS7NdUoHiNiFj1kpEbOH:I8FVwRpqPqPvkEC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 603026cd53e1deb722d14d6f7bf21b8e_JaffaCakes118
Files
-
603026cd53e1deb722d14d6f7bf21b8e_JaffaCakes118.exe windows:4 windows x86 arch:x86
b98c43f59635ad03924220e9debd317e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_ReplaceIcon
ImageList_Create
ImageList_Destroy
ord17
PropertySheetA
winmm
PlaySoundA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
GetProcessHeap
HeapFree
GetProcAddress
LoadLibraryA
GetVersionExA
OpenFile
GetShortPathNameA
DeleteFileA
SetFileAttributesA
GetModuleFileNameA
GetPrivateProfileStringA
GetWindowsDirectoryA
_lclose
_lread
WriteFile
CreateFileA
GetLocalTime
GetFileSize
FileTimeToSystemTime
GetFileTime
FindClose
FindNextFileA
FindFirstFileA
GetFileAttributesA
MoveFileA
CreateDirectoryA
ExpandEnvironmentStringsA
HeapAlloc
GetLastError
CreateProcessA
SearchPathA
WideCharToMultiByte
MultiByteToWideChar
lstrcpynA
LocalFree
FormatMessageA
GetStringTypeA
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
LCMapStringW
LCMapStringA
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
FreeLibrary
GlobalAlloc
GetPrivateProfileIntA
Sleep
GlobalLock
GlobalUnlock
GlobalFree
GetProfileStringA
WritePrivateProfileStringA
SetErrorMode
OpenProcess
GetExitCodeProcess
TerminateProcess
CloseHandle
lstrcmpiA
WinExec
lstrcpyA
lstrcatA
lstrlenA
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
WriteProfileStringA
user32
CreatePopupMenu
GetCursorPos
LoadStringA
SetTimer
KillTimer
PostQuitMessage
CreateWindowExA
LoadBitmapA
RegisterClassA
PostMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetWindowThreadProcessId
AppendMenuA
IsWindowEnabled
GetWindowRect
GetSystemMetrics
SetWindowPos
ChildWindowFromPoint
GetPropA
UpdateWindow
GetParent
IsWindow
GetClientRect
InvalidateRect
GetWindowLongA
SetWindowLongA
TrackPopupMenuEx
DefWindowProcA
DestroyWindow
MessageBoxExA
wsprintfA
SendMessageA
EnableWindow
ShowWindow
GetWindowTextA
DrawTextA
FindWindowA
BringWindowToTop
SetForegroundWindow
LoadIconA
LoadCursorA
SetCursor
EndDialog
SetWindowTextA
GetDlgItemInt
SetPropA
GetDlgItemTextA
SetDlgItemTextA
SendDlgItemMessageA
DialogBoxParamA
GetDlgItem
GetClassNameA
gdi32
SetBkMode
GetStockObject
CreateFontA
SelectObject
SetTextColor
advapi32
GetServiceKeyNameA
ControlService
OpenSCManagerA
OpenServiceA
CloseServiceHandle
QueryServiceStatus
StartServiceA
RegSetValueExA
RegDeleteValueA
RegQueryValueExA
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumValueA
RegEnumKeyA
RegCreateKeyA
shell32
Shell_NotifyIconA
ExtractIconA
ShellExecuteA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemFree
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ