Static task
static1
Behavioral task
behavioral1
Sample
836de9089d59e228010baf2773817dd2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
836de9089d59e228010baf2773817dd2_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
836de9089d59e228010baf2773817dd2_JaffaCakes118
-
Size
53KB
-
MD5
836de9089d59e228010baf2773817dd2
-
SHA1
087aaec5cfdd1c0bdf71e33bfb12bab791a80706
-
SHA256
1a4892c75c1e38dbedc0e0e29ca6b540ca569b766ca75e85440e1ed4672053b6
-
SHA512
9aec226efe4b18dada03864647c4817bf2913daa6ccb6c727ea898c553d925c35cb2bd7aad16dc21a7eb657a89bfff63aef8a9b9cb00d24cbbfc3007aa130cf7
-
SSDEEP
1536:9OsnmSNFtB1CFu5bZy6vqPard2BuplNBCNY:csnmSNfeFuC8LV5BCNY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 836de9089d59e228010baf2773817dd2_JaffaCakes118
Files
-
836de9089d59e228010baf2773817dd2_JaffaCakes118.exe windows:4 windows x86 arch:x86
7de504c151a6d8061fcbe59a08aebacc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddAtomW
GetFileAttributesExA
lstrcatW
lstrcatW
lstrcmpW
GetComputerNameA
OpenSemaphoreW
CompareStringA
SetUnhandledExceptionFilter
CompareStringA
AddAtomW
WaitForSingleObject
CompareStringA
HeapAlloc
CallNamedPipeA
SetUnhandledExceptionFilter
HeapDestroy
lstrcat
ExitProcess
AddAtomW
OpenEventA
AddAtomW
WaitForSingleObject
lstrcat
ExitProcess
OpenSemaphoreW
GetLongPathNameA
lstrcmpA
OpenSemaphoreW
lstrcmpA
EnumSystemLanguageGroupsA
AddAtomW
HeapDestroy
lstrcmpA
OpenEventA
GetLongPathNameA
EnumSystemLanguageGroupsA
EnumSystemLanguageGroupsA
CompareStringA
WaitForSingleObject
CompareStringA
HeapCreate
lstrcmpW
OpenSemaphoreW
lstrcatW
SetLastError
WaitForSingleObject
lstrcatW
lstrcatW
lstrcatW
HeapCreate
AddAtomW
GetComputerNameA
SetUnhandledExceptionFilter
SetLastError
GetLongPathNameA
OpenEventA
OpenSemaphoreW
GetComputerNameA
HeapAlloc
GetExitCodeThread
WaitForSingleObject
GetLongPathNameA
GetFileAttributesExA
OpenSemaphoreW
OpenEventA
EnumSystemLanguageGroupsA
lstrcmpA
VirtualProtect
HeapAlloc
HeapAlloc
lstrcmpW
FatalExit
HeapAlloc
HeapCreate
VirtualProtect
GetLongPathNameA
CreatePipe
user32
GetWindowRect
DispatchMessageA
LoadCursorW
BeginPaint
CharPrevExA
SendMessageW
MessageBoxA
GetDlgItem
SendMessageA
SendMessageW
GetDC
LoadStringW
GetSysColor
SetWindowLongA
GetSysColor
SetTimer
ShowWindow
GetWindowLongA
PeekMessageW
DialogBoxParamA
SendDlgItemMessageA
SetCursor
KillTimer
SetCursor
CharPrevExA
CharPrevExA
MessageBoxA
SendMessageA
GetDesktopWindow
GetDlgItemTextW
PeekMessageW
GetDlgItemTextW
GetClientRect
ShowWindow
EnableWindow
CharPrevW
TranslateMessage
DispatchMessageW
SetWindowLongW
LoadStringA
SetForegroundWindow
LoadCursorW
InvalidateRect
LoadStringW
SetDlgItemInt
CharPrevA
GetSysColor
LoadIconW
GetSysColor
ReleaseDC
CreateWindowExA
SetWindowTextW
CharPrevA
GetSysColor
EndPaint
LoadCursorA
SetWindowTextA
SendDlgItemMessageA
GetDlgItemTextW
wsprintfW
IsWindow
ShowWindow
DialogBoxParamA
DispatchMessageW
CharNextW
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ