Static task
static1
Behavioral task
behavioral1
Sample
842a3c0d45ea5ee60d919b74142347a5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
842a3c0d45ea5ee60d919b74142347a5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
842a3c0d45ea5ee60d919b74142347a5_JaffaCakes118
-
Size
173KB
-
MD5
842a3c0d45ea5ee60d919b74142347a5
-
SHA1
c8f03a2e477ad1988a93c3e2edb04a696c51c029
-
SHA256
88180cbd12d24577971c5e4b0b53fdb4e547aba669623fdd462d467dda89ca4e
-
SHA512
1a1804591547e7d9162fb5863d75f2d659cc41ac80da9cf6bb7ed8a8aa1facf94d24bbb5665b8e6b6bb04bbe50b803b4b0af408dfe1434edf4a786e17ab882b2
-
SSDEEP
3072:pF0odmpZiTP0UWoxRE+wTj+JqS5KwZueS/dFSBC34fME30LQpkaQxE4:ocmKDfwtU2/yeqMou39E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 842a3c0d45ea5ee60d919b74142347a5_JaffaCakes118
Files
-
842a3c0d45ea5ee60d919b74142347a5_JaffaCakes118.exe windows:4 windows x86 arch:x86
1253557aa1ea2e68ee1d93a556e4b2b4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
ole32
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoInitialize
user32
MapWindowPoints
SetDlgItemTextW
PeekMessageW
GetClassInfoExW
GetWindow
MessageBoxW
RegisterClassExW
TranslateMessage
GetDlgItemTextW
GetDlgItem
DestroyWindow
GetWindowInfo
SetWindowTextW
SetCapture
GetWindowRect
EndPaint
GetClientRect
GetParent
CreateWindowExW
GetWindowTextLengthW
SystemParametersInfoW
LoadCursorW
GetDC
SetWindowPos
BeginPaint
DispatchMessageW
EndDialog
gdi32
GetDeviceCaps
CreateFontIndirectW
DeleteObject
kernel32
LoadLibraryW
VirtualAlloc
IsProcessorFeaturePresent
CreateSemaphoreW
MulDiv
InitializeCriticalSection
GetStartupInfoW
InterlockedIncrement
lstrcmpiW
LocalAlloc
VirtualFree
FreeEnvironmentStringsA
GetCurrentProcessId
GetConsoleMode
GetVersionExW
FindResourceW
TlsAlloc
WriteConsoleInputVDMA
GetStringTypeW
GetCurrentThreadId
GetACP
SetLastError
SetUnhandledExceptionFilter
DeleteFileW
InterlockedDecrement
RaiseException
GetFileAttributesW
GetFileType
CloseHandle
FlushFileBuffers
GetProcessHandleCount
GetVersion
lstrlenA
WideCharToMultiByte
IsDebuggerPresent
HeapDestroy
WriteConsoleW
SetFilePointer
CopyFileW
Sleep
ExitProcess
LoadLibraryExW
CreateFileW
GetModuleHandleW
LCMapStringW
HeapAlloc
LCMapStringA
HeapFree
SizeofResource
FreeLibrary
WritePrivateProfileSectionW
LockResource
GetProcessHeap
GetTickCount
GetOEMCP
SetStdHandle
InterlockedCompareExchange
GetModuleFileNameW
EnumResourceNamesA
LoadResource
LocalFree
ReadFile
TlsGetValue
SetHandleCount
GetSystemTimeAsFileTime
GetCurrentProcess
TlsSetValue
GetModuleFileNameA
FreeEnvironmentStringsW
CreateFileA
GetStartupInfoA
GetEnvironmentStringsW
GetFileSize
UnhandledExceptionFilter
WriteConsoleA
HeapSize
GetSystemDirectoryW
GetModuleHandleA
GetEnvironmentStrings
GetStringTypeA
GetThreadLocale
HeapReAlloc
GetProcAddress
RtlUnwind
GetVersionExA
GetLastError
WriteFile
GetCommandLineW
DeleteCriticalSection
LeaveCriticalSection
GetDriveTypeW
LoadLibraryA
GetConsoleCP
TlsFree
CreateProcessW
lstrcmpA
CreateFileMappingW
InterlockedExchange
QueryPerformanceCounter
FlushInstructionCache
GetCommandLineA
GetCPInfo
WaitForSingleObject
GetConsoleOutputCP
HeapCreate
GetStdHandle
GetLocaleInfoA
lstrlenW
msvfw32
ICInfo
shell32
ShellExecuteW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
Sections
.text Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idive Size: 1024B - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ