Static task
static1
Behavioral task
behavioral1
Sample
853b5cfffae9861ea6ae546e75874090_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
853b5cfffae9861ea6ae546e75874090_JaffaCakes118
-
Size
212KB
-
MD5
853b5cfffae9861ea6ae546e75874090
-
SHA1
e7121dd6f8d54cafe84a18a24704724282c62086
-
SHA256
c4187fb8181b8fea6129ca0508f30775d1d525cf32184cca057f1bbb7f1e052d
-
SHA512
c92da5cc534b857ef9c6079ad20d984facbfb8afb8d27722ae3d7f7707125dfc90faf6dfb1ab65f4c029394b05f31e1d19de5101fc1be31bf2605ac5f288d252
-
SSDEEP
3072:vNcb+i4uhMepnmqqnsZdysdJzTFrZtO9jxn7zkV1fu5DSXPC8EqG:lcbfhMepgntsdHNtORlnKeSX68PG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 853b5cfffae9861ea6ae546e75874090_JaffaCakes118
Files
-
853b5cfffae9861ea6ae546e75874090_JaffaCakes118.exe windows:4 windows x86 arch:x86
a3bcc2275b7cab486e583d7344b427f7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
shlwapi
SHDeleteKeyA
kernel32
GetWindowsDirectoryA
lstrlenA
GetVersionExA
GetCurrentProcess
GetModuleHandleA
GetModuleFileNameA
CreateProcessA
GetLastError
CreateFileA
CopyFileA
lstrcpyA
lstrcmpA
ExitThread
ExitProcess
UnmapViewOfFile
GetSystemTime
MapViewOfFile
SetFileTime
GetFileTime
CreateFileMappingA
GetFileSize
SleepEx
Sleep
RemoveDirectoryA
FindClose
FindNextFileA
FindFirstFileA
SetEndOfFile
SetFilePointer
GetShortPathNameA
MoveFileExA
DeleteFileA
WriteFile
LocalFree
FormatMessageA
WideCharToMultiByte
SetCurrentDirectoryA
LocalAlloc
GetExitCodeThread
CreateThread
OpenProcess
HeapAlloc
GetProcessHeap
HeapFree
TerminateProcess
GetDiskFreeSpaceA
ResumeThread
SuspendThread
GetSystemDirectoryA
CreateMutexA
OpenMutexA
WaitForSingleObject
ReleaseMutex
CloseHandle
lstrcmpiA
LoadLibraryA
GetProcAddress
FreeLibrary
GetFileAttributesA
lstrcatA
MultiByteToWideChar
CreateDirectoryA
GetStartupInfoA
user32
MessageBoxA
wsprintfA
GetForegroundWindow
SendMessageA
SetDlgItemTextA
SendDlgItemMessageA
EnableWindow
GetDlgItem
PostQuitMessage
DispatchMessageA
SetWindowTextA
GetMessageA
ShowWindow
LoadIconA
ExitWindowsEx
GetWindowLongA
SetWindowLongA
GetWindowRect
ScreenToClient
CreateWindowExA
CallWindowProcA
GetDlgItemTextA
DestroyWindow
DialogBoxParamA
CharUpperA
CreateDialogParamA
PostMessageA
EnumWindows
GetWindowThreadProcessId
GetWindowTextA
GetClientRect
SetWindowPos
TranslateMessage
FindWindowA
advapi32
RegQueryValueExA
AdjustTokenPrivileges
OpenProcessToken
RegOpenKeyExA
RegEnumKeyA
RegQueryInfoKeyA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegEnumKeyExA
GetUserNameA
FreeSid
LookupPrivilegeValueA
shell32
ShellExecuteA
SHBrowseForFolderA
SHGetMalloc
ShellExecuteExA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
CoTaskMemFree
oleaut32
SysAllocStringLen
LoadTypeLibEx
SysFreeString
msvcrt
_controlfp
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
sprintf
strtol
strcmp
strtoul
_itoa
memmove
strchr
strncpy
_ftol
memcpy
_strupr
_splitpath
wcsstr
wcsncmp
wcscat
wcscpy
free
malloc
memcmp
??2@YAPAXI@Z
??3@YAXPAX@Z
strstr
memset
strrchr
strlen
strcat
strcpy
__CxxFrameHandler
_except_handler3
__set_app_type
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 11KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.1data Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE