Static task
static1
Behavioral task
behavioral1
Sample
5f3ca02dafeb255efc8f6077f33d6788_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5f3ca02dafeb255efc8f6077f33d6788_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5f3ca02dafeb255efc8f6077f33d6788_JaffaCakes118
-
Size
224KB
-
MD5
5f3ca02dafeb255efc8f6077f33d6788
-
SHA1
edec1440065c4c35123d3d3aa62dcf23151aef4c
-
SHA256
4aeb3553d18891163b511a4e23c19faf13fdcebd1b98ff04daff2e2a614110ac
-
SHA512
2225547b1ff67e89d9cf876129914558aca5cf52e8b239f24400e0f3ac602f6dcdbe0ce9ae760179cb20a8ced33e17626fc13998cb95ab49f3548672eac104e5
-
SSDEEP
3072:GvjRSXcSHn5DhIWaEHr3fwOgH9Cq9nyQ3TmDrXeL1oYiBw9BNZvDqsdkyg5:81SHn5DhIWaEroOgcqp7OrXQNpTh0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5f3ca02dafeb255efc8f6077f33d6788_JaffaCakes118
Files
-
5f3ca02dafeb255efc8f6077f33d6788_JaffaCakes118.exe windows:4 windows x86 arch:x86
1d0ab622db6613c4103cfc326edf6ae2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetBitmapDimensionEx
SetSystemPaletteUse
SetViewportExtEx
MoveToEx
GetEnhMetaFileHeader
UnrealizeObject
shell32
DragQueryFileW
ShellExecuteExA
SHGetDiskFreeSpaceA
SHFormatDrive
SHGetSpecialFolderPathW
SHGetFileInfoA
FindExecutableW
InternalExtractIconListA
SheSetCurDrive
SHAppBarMessage
DragQueryFileA
ExtractIconExW
ShellExecuteExW
SHGetNewLinkInfo
DragAcceptFiles
SHGetFileInfoW
SHFileOperation
ShellExecuteA
advapi32
DuplicateTokenEx
RegOpenKeyW
CryptSetProviderW
RegOpenKeyExW
LookupPrivilegeValueW
LookupPrivilegeNameW
CryptDestroyHash
LookupSecurityDescriptorPartsA
RegQueryInfoKeyA
LogonUserW
LookupPrivilegeNameA
RegEnumKeyA
RegDeleteKeyA
RegFlushKey
GetUserNameW
user32
GetClipboardViewer
DrawFrameControl
MenuItemFromPoint
GetThreadDesktop
RegisterClassA
GetDoubleClickTime
DdePostAdvise
DlgDirSelectComboBoxExA
GetKeyboardLayoutList
GetClassInfoA
CharToOemW
GetForegroundWindow
ValidateRect
LoadMenuW
GetQueueStatus
GetKeyboardLayoutNameA
SetWinEventHook
ImpersonateDdeClientWindow
DdeInitializeA
GetClientRect
ReleaseCapture
GetClipboardData
LoadBitmapW
OemToCharW
RealGetWindowClass
kernel32
GetModuleHandleA
TlsSetValue
SetHandleCount
EnterCriticalSection
GetLastError
RtlUnwind
GetStartupInfoA
HeapCreate
GetModuleFileNameA
GetCurrentThreadId
GetProcAddress
HeapReAlloc
GetModuleFileNameW
VirtualAlloc
GetProfileStringA
TlsGetValue
GetProcessShutdownParameters
TlsAlloc
GetCurrentProcess
InterlockedExchange
VirtualQuery
LocalFree
FreeEnvironmentStringsW
InitializeCriticalSection
GetCurrentThread
HeapFree
GetEnvironmentStrings
GetFileType
TlsFree
IsBadWritePtr
GetStartupInfoW
ExitProcess
HeapAlloc
GetCommandLineW
HeapDestroy
GetCommandLineA
GetCurrentProcessId
MultiByteToWideChar
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
UnhandledExceptionFilter
VirtualFree
LeaveCriticalSection
LoadLibraryA
FreeEnvironmentStringsA
GetStdHandle
GetSystemTimeAsFileTime
TerminateProcess
GetVersion
SetLastError
WriteFile
GetEnvironmentStringsW
Sections
.text Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 106KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ