Static task
static1
Behavioral task
behavioral1
Sample
68436318693954e7fb53963df3ddbf41_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
68436318693954e7fb53963df3ddbf41_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
68436318693954e7fb53963df3ddbf41_JaffaCakes118
-
Size
25KB
-
MD5
68436318693954e7fb53963df3ddbf41
-
SHA1
e3a620a923646c54c5dc5c56d18b6c93cf4956f3
-
SHA256
a72e32c8ed70835ef7b0f75a1715fbfd9c882d719778e5fb051701683f824ba1
-
SHA512
1ce651f88c3423c9f7b03d891dfffc2e3b8b7f9f607581d22c0304eaf335421f204b040b60c55ba23bbabc39c7714587fabcc5b0b2aa57281b347f8453ee305e
-
SSDEEP
384:XAC8aUZpCyG5U2lWKUKR5IaTk3m1Y21VmE7:XH8VZpCX5blxjInvWVmE7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 68436318693954e7fb53963df3ddbf41_JaffaCakes118
Files
-
68436318693954e7fb53963df3ddbf41_JaffaCakes118.exe windows:4 windows x86 arch:x86
c2c3c212c4d06dd95bb429ca4b69b809
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
IsTextUnicode
RegCloseKey
RegCreateKeyW
RegOpenKeyExA
RegQueryValueExA
RegQueryValueExW
RegSetValueExW
kernel32
CloseHandle
CompareStringW
CreateFileMappingW
CreateFileW
DeleteFileW
FindClose
FindFirstFileW
FoldStringW
FormatMessageW
GetACP
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetFileAttributesW
GetFileInformationByHandle
GetLastError
GetLocalTime
GetLocaleInfoW
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
GetUserDefaultLCID
GetUserDefaultUILanguage
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryA
LocalAlloc
LocalFree
LocalLock
LocalReAlloc
LocalSize
LocalUnlock
MapViewOfFile
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
ReadFile
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
WideCharToMultiByte
WriteFile
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
user32
CharLowerW
CharNextW
CharUpperW
CheckMenuItem
ChildWindowFromPoint
CloseClipboard
CreateDialogParamW
CreateWindowExW
DefWindowProcW
DestroyWindow
DialogBoxParamW
DispatchMessageW
DrawTextExW
EnableMenuItem
EnableWindow
EndDialog
GetClientRect
GetCursorPos
GetDC
GetDesktopWindow
GetDlgCtrlID
GetDlgItem
GetDlgItemTextW
GetFocus
GetForegroundWindow
GetKeyboardLayout
GetMenu
GetMenuState
GetMessageW
GetParent
GetSubMenu
GetSystemMenu
GetSystemMetrics
GetWindowLongW
GetWindowPlacement
GetWindowTextW
InvalidateRect
IsClipboardFormatAvailable
IsDialogMessageW
IsIconic
LoadAcceleratorsW
LoadCursorW
LoadIconW
LoadImageW
LoadStringW
MessageBeep
MessageBoxW
MoveWindow
OpenClipboard
PeekMessageW
PostMessageW
PostQuitMessage
RegisterClassExW
RegisterWindowMessageW
ReleaseDC
ScreenToClient
SendDlgItemMessageW
SendMessageW
SetActiveWindow
SetCursor
SetDlgItemTextW
SetFocus
SetScrollPos
SetWinEventHook
SetWindowLongW
SetWindowPlacement
SetWindowTextW
ShowWindow
TranslateAcceleratorW
TranslateMessage
UnhookWinEvent
UpdateWindow
WinHelpW
wsprintfW
Sections
.text Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ