Static task
static1
Behavioral task
behavioral1
Sample
6f4b18fc34c2c169dacee7bec6de1996_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6f4b18fc34c2c169dacee7bec6de1996_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6f4b18fc34c2c169dacee7bec6de1996_JaffaCakes118
-
Size
152KB
-
MD5
6f4b18fc34c2c169dacee7bec6de1996
-
SHA1
40d0d4892479856b8a97a215956108ed911b442c
-
SHA256
5f61a00af4feb84b2373abc6b032417dafe1ceb73270c7ad829b263c3d8b3cbe
-
SHA512
0adc22688b945c4c39510b2efb375f529e9430cf4c481aa33106021f1fd46310dd91559744785d9105d206d7923421401d60d98b2c644d10205b50c9d1a9844a
-
SSDEEP
3072:KvqA6rbUBlMqub88ujwpDWIEra+nGeEio+n63Fo:KvN6fUvMq885jwIfnqFo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6f4b18fc34c2c169dacee7bec6de1996_JaffaCakes118
Files
-
6f4b18fc34c2c169dacee7bec6de1996_JaffaCakes118.exe windows:4 windows x86 arch:x86
3d248047ea73b37a44eb9eb3db66222d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileSize
GetFileTime
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
ExitProcess
TerminateProcess
CreateThread
ExitThread
HeapFree
RaiseException
HeapAlloc
GetTimeZoneInformation
GetACP
HeapReAlloc
HeapSize
SetStdHandle
GetFileType
GetFileAttributesA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
GetFullPathNameA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
FindFirstFileA
FindClose
GetProcAddress
SetLastError
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
GlobalHandle
GlobalUnlock
GlobalFree
TlsAlloc
ResumeThread
WaitForSingleObject
CloseHandle
GetModuleFileNameA
lstrcatA
SetErrorMode
FileTimeToLocalFileTime
FileTimeToSystemTime
DeleteCriticalSection
LoadLibraryA
FormatMessageA
LocalFree
LocalAlloc
FreeLibrary
lstrcpyA
GetLastError
lstrcpynA
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedIncrement
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GetCommandLineA
GetModuleHandleA
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
Sleep
GetLocalTime
ExpandEnvironmentStringsA
CreateDirectoryA
InterlockedDecrement
user32
ShowWindow
LoadCursorA
GetSysColorBrush
DestroyMenu
LoadIconA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
GetClientRect
CopyRect
GetTopWindow
GetCapture
WinHelpA
RegisterClassA
GetMenu
GetSubMenu
GetMenuItemID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
CharUpperA
LoadStringA
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetMessageA
PostThreadMessageA
PostQuitMessage
PostMessageA
GetDC
GetMenuItemCount
UnhookWindowsHookEx
GetLastActivePopup
IsWindowEnabled
MessageBoxA
GetDlgItem
EnableWindow
GetWindowTextA
wsprintfA
SetWindowsHookExA
GetCursorPos
PeekMessageA
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
SendMessageA
GetActiveWindow
DispatchMessageA
TranslateMessage
SetCursor
GetNextDlgTabItem
GetParent
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetWindowLongA
GetClassNameA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetClassInfoA
gdi32
GetDeviceCaps
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
PtVisible
CreateBitmap
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
shell32
ShellExecuteA
comctl32
ord17
ole32
CoInitialize
CoCreateInstance
oleaut32
VariantClear
SysAllocString
SysAllocStringLen
GetErrorInfo
SysFreeString
urlmon
URLDownloadToFileA
wininet
InternetGetLastResponseInfoA
DeleteUrlCacheEntry
InternetGetConnectedState
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetReadFile
InternetQueryDataAvailable
Sections
.text Size: 108KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ