Static task
static1
Behavioral task
behavioral1
Sample
7297767ded0c21d889420922c06c7dd3_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
7297767ded0c21d889420922c06c7dd3_JaffaCakes118
-
Size
180KB
-
MD5
7297767ded0c21d889420922c06c7dd3
-
SHA1
5e53fa971f6d20326aa08b804cdcfd508e9f7350
-
SHA256
f1d8e180ff56073e584b49e1192e6e5cd680e8b5f35db88b20ce2f6ab31df74a
-
SHA512
e598490229c83a5bf4c9b6c213a200884663915bf2471590926b8451f7b499023215bd1cbfd0f2a1f24fbf273dfcaf724272edb04c4b0e6259ca86e7a7c3b524
-
SSDEEP
3072:IxYD/9ctwl0gYjQFIRW1hl0M6MuA+vhrodZyKaRZnIW5M1ZjLIc4Bz:0acPAIRW1hl0Mpu9vFKYKqIWQjLY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7297767ded0c21d889420922c06c7dd3_JaffaCakes118
Files
-
7297767ded0c21d889420922c06c7dd3_JaffaCakes118.exe windows:4 windows x86 arch:x86
7eac9c91be4e3b907d97923e4883d5c0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoGetProcessIdentifier
GetRunningObjectTable
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
StringFromGUID2
CoCreateInstance
CoUninitialize
CoFreeUnusedLibraries
CreateItemMoniker
shlwapi
PathAddBackslashW
PathFindExtensionW
PathRemoveExtensionW
PathGetDriveNumberW
PathFileExistsW
PathFindFileNameW
ddraw
DirectDrawCreateEx
user32
SendMessageW
SetTimer
RegisterClassExW
DefWindowProcW
KillTimer
DestroyWindow
UnregisterDeviceNotification
LoadCursorW
CreateWindowExW
RegisterDeviceNotificationW
IsWindow
wsprintfW
kernel32
GetThreadLocale
GlobalFree
InterlockedCompareExchange
GetSystemDirectoryA
GetSystemDefaultLCID
GetSystemInfo
GetUserDefaultLangID
WideCharToMultiByte
WaitForSingleObject
GetCalendarInfoW
GetCurrentProcess
SetCurrentDirectoryA
GetEnvironmentVariableW
GetProfileStringW
CloseHandle
GetDateFormatW
GetModuleFileNameA
FindClose
TlsFree
TerminateProcess
InterlockedIncrement
CreateSemaphoreA
QueryPerformanceCounter
GetDateFormatA
DeleteFileW
FreeLibrary
GetLastError
ReleaseMutex
LocalAlloc
GetCurrentThread
GetFileSize
Sleep
FindNextFileA
UnhandledExceptionFilter
CreateMutexA
InterlockedExchange
GetCurrentDirectoryA
GetTickCount
EnterCriticalSection
ExitProcess
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
LoadLibraryA
DeleteCriticalSection
LeaveCriticalSection
EnumResourceNamesA
lstrcmpW
TlsSetValue
GetCurrentThreadId
GetVersionExA
MultiByteToWideChar
ReadFile
InitializeCriticalSection
GetTimeFormatW
GlobalAlloc
lstrlenW
GlobalLock
GetTempPathW
GetLocaleInfoA
GetThreadPriority
IsProcessorFeaturePresent
FindFirstFileA
GetTimeFormatA
GetFileTime
GlobalSize
IsDebuggerPresent
ReleaseSemaphore
SetUnhandledExceptionFilter
GetProcAddress
GetWindowsDirectoryA
TlsGetValue
CreateFileA
GetLocalTime
GetModuleHandleA
SetThreadPriority
GlobalUnlock
RaiseException
wmvcore
WMCreateProfileManager
advapi32
RegSetValueExW
RegCreateKeyW
RegQueryValueExW
RegOpenKeyExW
RegSetValueW
RegCloseKey
RegDeleteKeyW
RegEnumKeyExW
Sections
.text Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ