Static task
static1
Behavioral task
behavioral1
Sample
6ee452b7893df4763b386e5b1935f24d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6ee452b7893df4763b386e5b1935f24d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6ee452b7893df4763b386e5b1935f24d_JaffaCakes118
-
Size
112KB
-
MD5
6ee452b7893df4763b386e5b1935f24d
-
SHA1
bdb11de01a85891b8973012c16219f31e0424123
-
SHA256
7a102b22e4a30bdc99ba2aac64dd9c6ca42dcf5e6e855da6b4fa1072c7a98e04
-
SHA512
3fc051ce2dd450d14080b9969e0138201b3d5c3173a7a1030e4e23b43ac9b79704a7b41cebf808405240cd21b3a79b8ff1ad438cfc2edfdaaf644e4662213fea
-
SSDEEP
1536:H9w1d3EDgIi4WLbnmqkN72G5qlAAhK/i/pBQTX21qZcIUoGFBf:dwd3EgT4WLbmx7Sldh2McQ6croGFBf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6ee452b7893df4763b386e5b1935f24d_JaffaCakes118
Files
-
6ee452b7893df4763b386e5b1935f24d_JaffaCakes118.exe windows:4 windows x86 arch:x86
5c9ecba8cba476acb6bde34174ed3759
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
GetLogicalDrives
GetModuleFileNameA
MulDiv
GlobalFree
GlobalAlloc
OpenProcess
FreeLibrary
GetProcAddress
LoadLibraryA
GetVersionExA
TerminateProcess
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
WriteFile
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
WinExec
HeapDestroy
CreateFileA
GetFileType
GetStdHandle
SetHandleCount
SetFilePointer
ReadFile
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
HeapSize
GetOEMCP
GetACP
GetCPInfo
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindNextFileA
FindFirstFileA
GetLastError
HeapAlloc
HeapReAlloc
HeapFree
GetCurrentProcess
ExitProcess
GetLocalTime
GetSystemTime
GetTimeZoneInformation
GetFileAttributesA
RtlUnwind
DeleteFileA
Sleep
GetLogicalDriveStringsA
GetVolumeInformationA
SetErrorMode
CloseHandle
DeviceIoControl
Beep
CopyFileA
GetSystemDirectoryA
GetEnvironmentVariableA
GetWindowsDirectoryA
HeapCreate
GetVersion
user32
GetDlgItemInt
GetDlgItemTextA
GetWindowTextLengthA
GetDlgItem
RegisterWindowMessageA
RegisterClassExA
EndDialog
DialogBoxParamA
BeginPaint
GetClientRect
FillRect
MoveWindow
DrawTextA
EndPaint
PostQuitMessage
GetSystemMetrics
LoadCursorA
UpdateWindow
SendMessageA
MessageBoxA
SetWindowPos
ShowWindow
wsprintfA
SetDlgItemTextA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
SetActiveWindow
FindWindowA
DefWindowProcA
GetCursorPos
SetForegroundWindow
TrackPopupMenu
PostMessageA
GetMenuItemID
LoadMenuA
GetSubMenu
DestroyMenu
SetMenuDefaultItem
LoadStringA
KillTimer
SetTimer
LoadIconA
DestroyWindow
CreateWindowExA
SendDlgItemMessageA
gdi32
CreateFontA
CreateSolidBrush
SetBkMode
SelectObject
SetTextColor
GetDeviceCaps
advapi32
RegDeleteValueA
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
shell32
Shell_NotifyIconA
winmm
mciSendCommandA
Sections
.text Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ