Static task
static1
Behavioral task
behavioral1
Sample
6f873fca32d55aa78503d06f26fa3ac8_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6f873fca32d55aa78503d06f26fa3ac8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6f873fca32d55aa78503d06f26fa3ac8_JaffaCakes118
-
Size
130KB
-
MD5
6f873fca32d55aa78503d06f26fa3ac8
-
SHA1
63322976d9b9a5b8df03242fc68e702a84f0906b
-
SHA256
4d32ca4d1207e1c70657406c19d0373b115864fdf68116157e4c6a33f9c70248
-
SHA512
c77fc3848415d9b96224c9bab8370ebb5db049b171d1e804edfb3ae9c6ee17cb3b944aba177287cbb980f75e15597cbf214ffada1d476c664822b0aecd6fd1a4
-
SSDEEP
768:SBzieWOWexZdsWoW6tC+LUiiKbqApRi6PvAFzRIHQRUn4ju7K1R/Ps4RCP:uuVlqMisvAfTjpX/P5Ri
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6f873fca32d55aa78503d06f26fa3ac8_JaffaCakes118
Files
-
6f873fca32d55aa78503d06f26fa3ac8_JaffaCakes118.exe windows:4 windows x86 arch:x86
d5c9a2a219ef98b25df74da815243ecd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenMutexW
LocalAlloc
CreateMutexW
CreateProcessW
GetModuleFileNameW
lstrcpyW
LocalFree
LeaveCriticalSection
HeapAlloc
GetProcessHeap
EnterCriticalSection
HeapFree
GetLastError
ReleaseMutex
CloseHandle
InitializeCriticalSection
DeleteCriticalSection
GetCommandLineW
lstrcpynW
HeapDestroy
VirtualFree
RtlUnwind
GetStdHandle
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
GetFileType
HeapCreate
TerminateProcess
GetVersion
lstrcmpW
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
ExitProcess
LoadLibraryA
GetProcAddress
VirtualAlloc
WriteFile
user32
wsprintfW
GetClassNameW
FindWindowW
SendMessageW
GetMessageW
CharPrevW
GetWindowTextW
TranslateMessage
DispatchMessageW
RegisterClassExW
CreateWindowExW
LoadImageW
EnumWindows
DestroyWindow
GetMenuStringW
SetForegroundWindow
IsWindowVisible
ShowWindow
IsIconic
GetCursorPos
CreatePopupMenu
TrackPopupMenuEx
PostMessageW
DefWindowProcW
GetWindowLongW
AppendMenuW
CharNextW
LoadStringW
PostQuitMessage
DestroyMenu
LoadCursorW
winspool.drv
GetPrinterW
EnumPrintersW
OpenPrinterW
GetPrinterDriverW
ClosePrinter
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
shell32
Shell_NotifyIconW
comctl32
ord17
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 823B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 99KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ehwxhck Size: 80KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kwyxwjq Size: 4KB - Virtual size: 72KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE