Static task
static1
Behavioral task
behavioral1
Sample
67e96bc7ecc9f190048d90ffb9f8bed1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
67e96bc7ecc9f190048d90ffb9f8bed1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
67e96bc7ecc9f190048d90ffb9f8bed1_JaffaCakes118
-
Size
140KB
-
MD5
67e96bc7ecc9f190048d90ffb9f8bed1
-
SHA1
d5081f5d39a2119ef241d9672c1d3eaf38c0b9fc
-
SHA256
8fefad3b73d358483289fdf895f094911421abf8180e7a5c3b7b27c1d492fc4c
-
SHA512
5bdaa6d770b019064421ba9fc199db559147c5bda552e2ae30f7533545d6d8c4dd16d27e39e550cf6de8f9a95d8a757d8a684d1754e480abafcff553fb96b9bf
-
SSDEEP
3072:o1J9szWY/rwSQYEipnWVMMZpVlNWKhctK1aOK5uh5IwlVvRx2ruCyW:o1VGrVEy81ZhNPAK1tsuP/TcuV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67e96bc7ecc9f190048d90ffb9f8bed1_JaffaCakes118
Files
-
67e96bc7ecc9f190048d90ffb9f8bed1_JaffaCakes118.exe windows:5 windows x86 arch:x86
61e5c9b7fd50a2643023036e40f18858
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalGetAtomNameA
SetThreadAffinityMask
GetCommandLineA
UnmapViewOfFile
lstrlenW
GetFileType
GetProcAddress
FlushInstructionCache
GlobalAlloc
GetModuleFileNameA
GetTickCount
GetCurrentThread
TerminateProcess
LeaveCriticalSection
CloseHandle
GlobalReAlloc
GetWindowsDirectoryA
ExitProcess
VirtualQueryEx
GetFullPathNameA
GetStringTypeExA
SizeofResource
GetModuleHandleA
SetEndOfFile
CreateDirectoryA
FindClose
RemoveDirectoryA
FindResourceA
MapViewOfFileEx
CreateFileMappingA
LoadResource
ReadFile
SetThreadLocale
SetFileAttributesA
GetFileAttributesW
IsValidCodePage
OpenFileMappingA
GlobalAlloc
RaiseException
DeleteFileA
RtlUnwind
GlobalMemoryStatus
SetEvent
WaitForMultipleObjects
user32
GetMenuState
DrawTextA
GetCaretPos
GetSysColor
SetParent
GetKeyNameTextW
SetWindowLongA
ScreenToClient
GetFocus
GetForegroundWindow
DestroyMenu
IsChild
GetDesktopWindow
SetClassLongA
UnhookWindowsHookEx
ScrollWindowEx
SystemParametersInfoA
IsDialogMessageA
GetSysColorBrush
CreateWindowExA
GetMenuStringA
GetDoubleClickTime
SetWindowPlacement
CallWindowProcA
GetLastActivePopup
DrawMenuBar
SetTimer
KillTimer
SendNotifyMessageA
DrawIcon
gdi32
CreateDCA
CreatePenIndirect
CreateSolidBrush
CopyEnhMetaFileA
SetWinMetaFileBits
SetEnhMetaFileBits
GetTextExtentPointA
GetWinMetaFileBits
GetEnhMetaFileHeader
GetTextMetricsA
GetDeviceCaps
GetEnhMetaFilePaletteEntries
GetSystemPaletteEntries
SetTextCharacterExtra
SelectClipRgn
CombineRgn
GetTextExtentPoint32W
GetClipRgn
FrameRgn
SetAbortProc
comctl32
ImageList_Create
ImageList_Write
ImageList_GetDragImage
ImageList_DragShowNolock
ImageList_GetBkColor
ImageList_DragLeave
ImageList_EndDrag
odbcname
_FDtest
_Eps
_Strxfrm
_Snan
_Xbig
_Sinh
_Stof
_FDscale
_Mbrtowc
_LPoly
oleaut32
SafeArrayCreateVector
VariantClear
VariantChangeType
urlmon
CoInternetCreateSecurityManager
ole32
OleUninitialize
IsAccelerator
CoDisconnectObject
wininet
InternetCombineUrlA
InternetCrackUrlA
InternetGetLastResponseInfoA
InternetOpenUrlA
InternetAttemptConnect
shell32
ShellExecuteExA
comdlg32
FindTextA
version
GetFileVersionInfoSizeA
advapi32
RegSetValueExA
RegEnumValueA
Sections
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ