Static task
static1
Behavioral task
behavioral1
Sample
604399a47bd33eda7297d505c350ae02_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
604399a47bd33eda7297d505c350ae02_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
604399a47bd33eda7297d505c350ae02_JaffaCakes118
-
Size
92KB
-
MD5
604399a47bd33eda7297d505c350ae02
-
SHA1
abf65c0324a77083d825c20a67609cb2647dcffe
-
SHA256
9761fea0ef7206cf1fe66a8b9d4d35b858b396f2ac702d22b9d678db73ed51db
-
SHA512
b23adf926785d3a71b83c9a7595c0acb00868995cdd0f1c6aa5ddff60f9e67a9cfd8624e1962bbbc6214d72d593bf3610aec99a60904a6eabb49338d5a8eb58f
-
SSDEEP
1536:BXSi3rbzNkdG2/pxrM2GMlpy810Kc18aQpNO4O/TPpH9saVmn0yqV/A:TBkzg2GMlh10/8aQp5O/T/m0PVo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 604399a47bd33eda7297d505c350ae02_JaffaCakes118
Files
-
604399a47bd33eda7297d505c350ae02_JaffaCakes118.exe windows:4 windows x86 arch:x86
0003847ab495bc46a12c3fc56844e1ee
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
QueryPerformanceCounter
HeapSize
ReadFile
SetEndOfFile
VirtualQuery
RtlUnwind
GetCPInfo
GetOEMCP
GetACP
IsBadWritePtr
HeapReAlloc
VirtualAlloc
SetStdHandle
HeapAlloc
CreateFileA
VirtualFree
HeapCreate
GetCurrentThreadId
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetModuleFileNameA
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
LoadLibraryA
GetProcAddress
VirtualAllocEx
lstrcpynW
GetSystemInfo
GlobalSize
LCMapStringW
FlushFileBuffers
CreateFileW
GetCurrentDirectoryA
OpenEventW
FindClose
IsValidLocale
MoveFileW
GetTempPathW
GetLocaleInfoW
CreateDirectoryW
HeapDestroy
GetStdHandle
WriteFile
CloseHandle
HeapFree
SetFilePointer
GetLastError
GetCurrentProcess
TerminateProcess
ExitProcess
TlsAlloc
SetEnvironmentVariableA
GlobalLock
TlsSetValue
WriteConsoleA
TerminateThread
GetDriveTypeW
FindFirstFileW
CreateProcessW
InterlockedExchange
GetCurrentProcessId
GetDriveTypeA
GetCommandLineW
GetExitCodeProcess
FindResourceW
GetFileType
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
VirtualProtect
user32
GetKeyState
ScreenToClient
BeginPaint
ScrollWindow
LoadImageW
ToAscii
DrawMenuBar
HideCaret
GetDC
GetCursorPos
CreateAcceleratorTableW
DragDetect
OpenClipboard
CreateWindowExW
SetWindowPos
DialogBoxParamW
GetKeyboardState
DestroyCursor
IsWindow
AppendMenuW
DeleteMenu
GetDlgItemInt
IsClipboardFormatAvailable
CreateMenu
EmptyClipboard
DrawTextExW
SetForegroundWindow
IsDialogMessageW
SetDlgItemInt
DestroyIcon
WindowFromPoint
TranslateAcceleratorW
UpdateWindow
gdi32
EndPage
LineTo
SetROP2
PatBlt
SetBkColor
CreateBitmap
SaveDC
RemoveFontResourceW
CreateFontW
GetTextExtentPointW
CreatePen
GetDeviceCaps
CreateHatchBrush
DPtoLP
OffsetWindowOrgEx
SelectObject
DeleteObject
GetTextMetricsW
AddFontResourceW
CreateCompatibleBitmap
SetBkMode
CreateSolidBrush
GetTextExtentPoint32W
CreatePatternBrush
comdlg32
FindTextA
GetSaveFileNameA
GetFileTitleW
ReplaceTextA
PageSetupDlgW
ChooseFontA
PageSetupDlgA
PrintDlgW
advapi32
RegDeleteValueW
RegCreateKeyExA
RegSetValueExA
RegEnumKeyExW
RegQueryInfoKeyA
RegQueryInfoKeyW
RegDeleteKeyA
RegOpenKeyExW
RegFlushKey
RegQueryValueExW
RegDeleteValueA
RegCreateKeyA
RegCreateKeyW
RegCloseKey
RegQueryValueExA
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 190KB - Virtual size: 415KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ