Static task
static1
Behavioral task
behavioral1
Sample
824c191a083645b92288f55a13d4576e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
824c191a083645b92288f55a13d4576e_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
824c191a083645b92288f55a13d4576e_JaffaCakes118
-
Size
943KB
-
MD5
824c191a083645b92288f55a13d4576e
-
SHA1
96bb185b28c3f62d391f3c2502b0a6e645eed222
-
SHA256
21ac48029033cd457b64b388a1c032ea268c3d3c9b3ce72a9df6007f710a34fe
-
SHA512
e819eaf922f9a5d56f776890810724c07b421c729eaa25f8a63bcb2f3f62d8e86a8bceb8a7ad598b8a14c555b6b22f5cf14d657daf78e7fe9f850ac046b6778e
-
SSDEEP
24576:OLOYzZSLlawX8ayaCzr9u3p5QmtmBFEMi:YtusN45Qmo6Mi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 824c191a083645b92288f55a13d4576e_JaffaCakes118
Files
-
824c191a083645b92288f55a13d4576e_JaffaCakes118.exe windows:4 windows x86 arch:x86
673df7b0350ff14f47dddf1eb227eb7a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_DragEnter
DestroyPropertySheetPage
ImageList_GetBkColor
ImageList_Draw
user32
DefMDIChildProcA
ShowScrollBar
GetClipboardSequenceNumber
CheckDlgButton
CloseWindowStation
OpenIcon
EmptyClipboard
GetMenuStringA
DestroyCaret
GetMessageExtraInfo
GetWindowWord
GetClipboardFormatNameA
OpenDesktopA
ChangeClipboardChain
GetMenuItemRect
OpenClipboard
VkKeyScanA
IsCharLowerW
EnumWindowStationsA
kernel32
GetProcessHeap
GetCompressedFileSizeW
ExitProcess
GlobalFlags
GetOEMCP
WritePrivateProfileStringA
WriteFile
ExitThread
LeaveCriticalSection
SetConsoleOutputCP
GetBinaryTypeA
_llseek
IsProcessorFeaturePresent
GenerateConsoleCtrlEvent
QueryDosDeviceW
GetProcessTimes
FreeResource
EraseTape
GetModuleFileNameW
DeleteFiber
GlobalAddAtomW
LCMapStringA
SetConsoleCursorPosition
GlobalAddAtomA
GetACP
CreateProcessA
EnumSystemCodePagesW
WriteConsoleOutputCharacterA
GetVersion
UnhandledExceptionFilter
GetEnvironmentStringsW
GetTimeZoneInformation
GetAtomNameA
GetLocaleInfoW
SetEvent
LocalReAlloc
SetConsoleTitleA
ReadFile
GetBinaryTypeW
EnumCalendarInfoW
GetSystemTimeAsFileTime
lstrcpynA
DeleteCriticalSection
advapi32
ObjectCloseAuditAlarmA
RegFlushKey
RegCreateKeyW
CryptExportKey
QueryServiceLockStatusW
RegQueryValueExA
StartServiceCtrlDispatcherA
StartServiceA
ReportEventW
LookupPrivilegeDisplayNameA
CryptReleaseContext
SetNamedSecurityInfoW
RegUnLoadKeyA
CopySid
SetSecurityDescriptorSacl
UnlockServiceDatabase
msvcrt
_mbsdec
perror
_wtol
_snwprintf
fread
_setmode
_getdcwd
_lseeki64
_beginthread
wcscoll
_itoa
wscanf
_ui64tow
_mbsrchr
_strdup
_chmod
_mbctoupper
mktime
_stricoll
_wsetlocale
ftell
_wstrdate
_controlfp
_isctype
iswxdigit
Sections
.text Size: 11KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 597KB - Virtual size: 596KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ