Static task
static1
Behavioral task
behavioral1
Sample
6038b37a14592030cb7838827599301d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6038b37a14592030cb7838827599301d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6038b37a14592030cb7838827599301d_JaffaCakes118
-
Size
476KB
-
MD5
6038b37a14592030cb7838827599301d
-
SHA1
a9c3acb20187344a365b76e590af87fe4c66060b
-
SHA256
fede18ca63140eb25979080c3238e161c85e146e0b9605565c7a84066e8599a1
-
SHA512
0f037a34ef1946a430d6a978ab845fd44b602263973cefb04d2e39e3f769dbd49f434ebbee51ebe343ac6a99596ab6caf06e4ded1e09edb01b196569de76206d
-
SSDEEP
12288:hTHWJc/g/PpB02tYlZ2j2vz9xCwhGpYp3lsIg:hz+c4/LPtK2KUglvg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6038b37a14592030cb7838827599301d_JaffaCakes118
Files
-
6038b37a14592030cb7838827599301d_JaffaCakes118.exe windows:4 windows x86 arch:x86
cc139f53c11f45de663db34306765961
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDesktopWindow
SendMessageA
GetParent
IsIconic
GetWindow
SystemParametersInfoA
EnableWindow
GetSysColor
SetWindowLongA
MessageBoxA
LoadStringA
EndPaint
ReleaseDC
SetForegroundWindow
EndDialog
UpdateWindow
SetCursor
PostQuitMessage
IsWindow
GetCursorPos
GetSubMenu
FillRect
GetDC
GetDlgItem
GetSystemMetrics
ClientToScreen
GetMessageA
SetTimer
RegisterClassA
KillTimer
EnableMenuItem
InvalidateRect
ShowWindow
TranslateMessage
DispatchMessageA
SetWindowPos
DefWindowProcA
DestroyWindow
GetClientRect
GetWindowRect
GetWindowLongA
PeekMessageA
kernel32
LoadLibraryA
FindResourceW
TerminateProcess
GlobalLock
GetConsoleCP
GetStdHandle
GetFileAttributesA
SetHandleCount
SetErrorMode
RemoveDirectoryA
lstrlenA
GetSystemDirectoryA
GetConsoleOutputCP
ResetEvent
CreateThread
LoadResource
LoadLibraryExW
ExitProcess
GetCurrentThread
CreateFileW
GetEnvironmentVariableA
WaitForSingleObject
HeapSize
HeapFree
FreeEnvironmentStringsW
CreateEventA
HeapDestroy
GetCurrentProcess
CloseHandle
VirtualQuery
UnmapViewOfFile
GetStartupInfoA
DeleteFileA
ReleaseMutex
InterlockedIncrement
RaiseException
GetConsoleMode
SetLastError
SetEnvironmentVariableA
QueryPerformanceCounter
LeaveCriticalSection
InterlockedExchange
VirtualProtect
FindResourceA
SetEndOfFile
EnterCriticalSection
WriteConsoleW
LocalFree
LocalAlloc
IsValidCodePage
GetSystemInfo
SetStdHandle
VirtualAlloc
GetProcAddress
FreeLibrary
CreateDirectoryA
SetCurrentDirectoryA
GetSystemTimeAsFileTime
VirtualFree
HeapAlloc
GlobalAlloc
GetStringTypeA
GetModuleHandleA
GetEnvironmentStringsW
FreeEnvironmentStringsA
GetEnvironmentStrings
SetEvent
GetExitCodeProcess
GetCommandLineA
InterlockedDecrement
Sleep
FindNextFileW
InitializeCriticalSection
FlushFileBuffers
GetCPInfo
TlsGetValue
OutputDebugStringA
FindFirstFileA
lstrcpynA
TlsFree
IsDebuggerPresent
GlobalUnlock
SetUnhandledExceptionFilter
HeapCreate
FormatMessageA
GetModuleHandleW
GetProcessHeap
CompareStringA
MultiByteToWideChar
GetModuleFileNameW
TlsAlloc
GetCurrentThreadId
WriteFile
CreateEventW
GetFileSize
GetCurrentProcessId
FindClose
GetLocalTime
ReadFile
GetLastError
GetVersionExA
GetStringTypeW
CompareStringW
GetVersion
WideCharToMultiByte
GetCurrentDirectoryA
lstrlenW
GetTempPathA
DeleteCriticalSection
UnhandledExceptionFilter
GetFileAttributesW
FileTimeToSystemTime
LCMapStringA
GetTimeZoneInformation
GetThreadLocale
SetFilePointer
GetFileType
CreateFileA
LCMapStringW
WaitForMultipleObjects
SizeofResource
SetConsoleCtrlHandler
GetModuleFileNameA
GetOEMCP
GetACP
GetLocaleInfoA
TlsSetValue
LockResource
GlobalFree
HeapReAlloc
gdi32
GetDeviceCaps
CreateCompatibleDC
GetStockObject
DeleteDC
DeleteObject
advapi32
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
oleaut32
SysFreeString
SysStringLen
VariantClear
SysAllocString
msvcrt
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_strcmpi
Sections
.text Size: 460KB - Virtual size: 457KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ