Static task
static1
Behavioral task
behavioral1
Sample
681291a3c88a1897974510ec2c7e6306_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
681291a3c88a1897974510ec2c7e6306_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
681291a3c88a1897974510ec2c7e6306_JaffaCakes118
-
Size
88KB
-
MD5
681291a3c88a1897974510ec2c7e6306
-
SHA1
c15011fee5b26d5d7122bab47335680c5dd67a84
-
SHA256
1fae456383f9d875d14ba0f329c4c5642220eeb2ea78aae9cf49437c53dacbfe
-
SHA512
d7d9ed5106bd60f902cc696fa6ade63fad14558cf608f56b0f038ce7ae0cc638ef8ce3309a7a62c032ea4996ac4398bfd22aaf2a49a3aec0e47be0c9df1dab1d
-
SSDEEP
1536:r0+U0fO8ZwdnnK44EbYbRNTXUEztjUUB1bKhqWWvSL3wvvrK:rr1ZwdnuBUwtdB1YqWWKQu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 681291a3c88a1897974510ec2c7e6306_JaffaCakes118
Files
-
681291a3c88a1897974510ec2c7e6306_JaffaCakes118.exe windows:4 windows x86 arch:x86
d142f319684f8c28987a9b7762d84a42
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
ExtTextOutA
GetTextMetricsA
SetBkMode
SetROP2
SetTextColor
SelectObject
DeleteObject
GetStockObject
Rectangle
CreateFontIndirectA
CreateSolidBrush
advapi32
RegEnumValueA
RegOpenKeyExA
RegDeleteValueA
RegSetValueExA
RegCreateKeyA
RegDeleteKeyA
RegCloseKey
RegEnumKeyA
RegOpenKeyA
RegQueryValueExA
ole32
OleUninitialize
OleInitialize
oleaut32
LoadTypeLi
user32
GetSystemMenu
EnableMenuItem
SetWindowLongA
GetDlgItem
SetFocus
EndDialog
DialogBoxParamA
UpdateWindow
SetWindowTextA
InvalidateRect
DestroyWindow
CharUpperA
CharPrevA
DefWindowProcA
SetClassLongA
PostQuitMessage
BeginPaint
GetClientRect
wsprintfA
FillRect
DrawTextA
SetRect
EndPaint
CreateWindowExA
CreateDialogParamA
PackDDElParam
UnregisterClassA
GetWindowRect
GetSystemMetrics
SetWindowPos
ShowWindow
SetDlgItemTextA
TranslateMessage
DispatchMessageA
SetCursor
GetMessageA
PeekMessageA
PostMessageA
ShowCursor
LoadStringA
SendMessageA
UnpackDDElParam
CharNextA
LoadIconA
RegisterClassA
wvsprintfA
MessageBoxA
LoadCursorA
kernel32
lstrcmpiA
GetLastError
RemoveDirectoryA
TerminateProcess
GlobalFindAtomA
GlobalLock
GlobalUnlock
GlobalAlloc
GlobalFree
GlobalAddAtomA
GlobalDeleteAtom
SetFilePointer
HeapSize
HeapReAlloc
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
WriteFile
HeapCreate
GetStdHandle
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetStringTypeW
WideCharToMultiByte
GetStringTypeA
HeapAlloc
GetCurrentProcess
GetFileAttributesA
ExitProcess
HeapFree
GetOEMCP
GetACP
GetCPInfo
GetVersion
GetCommandLineA
LocalAlloc
lstrcpyA
lstrlenA
LocalFree
lstrcatA
lstrcpynA
GetStartupInfoA
IsDBCSLeadByte
lstrcmpA
CompareStringA
GetWindowsDirectoryA
DeleteFileA
Sleep
CloseHandle
WaitForSingleObject
OpenProcess
FindClose
FindFirstFileA
GetModuleHandleA
CreateProcessA
FreeLibrary
GetProcAddress
LoadLibraryA
SetErrorMode
MultiByteToWideChar
ReadFile
CreateFileA
RtlUnwind
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE