Static task
static1
Behavioral task
behavioral1
Sample
852160efec13df36c8680d6e4d002af6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
852160efec13df36c8680d6e4d002af6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
852160efec13df36c8680d6e4d002af6_JaffaCakes118
-
Size
773KB
-
MD5
852160efec13df36c8680d6e4d002af6
-
SHA1
a53fb7cc0c370dd2dabfef3908741dc65479bfc7
-
SHA256
61b8ee9b714ef88e99bffdfb9469b97be4ef85bc7ae39bf65c59f0c9c9a3464f
-
SHA512
136984ce0d84fe7a50233f3efbc933d1f516658ff6ac27210143f793e85cc485cdb3d6dbba44488ed9df364222755bcf4d2e3cc9089468d2e6bc9a35c294cc18
-
SSDEEP
12288:VP4XZ9KB83Xv8sPvHieAZ8rfuy6O/+XOHKWAeW6bbk8x3x2Z5k38Mw75GMwfiG:VP4JH/dvHDqWf5+DWH88Fx2ZqMMoDwf/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 852160efec13df36c8680d6e4d002af6_JaffaCakes118
Files
-
852160efec13df36c8680d6e4d002af6_JaffaCakes118.exe windows:4 windows x86 arch:x86
74f99b8b6379752eda6caaa3d3f8cda2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
FindExecutableA
user32
GetWindowWord
SetWindowWord
BeginPaint
GetSysColor
GetClientRect
SetRect
EndPaint
LoadCursorA
GetLastActivePopup
ShowWindow
PostMessageA
SendMessageA
EnableWindow
DestroyWindow
SetWindowTextA
SetForegroundWindow
SetActiveWindow
SendDlgItemMessageA
UpdateWindow
OemToCharBuffA
CharUpperBuffA
DefWindowProcA
KillTimer
DialogBoxIndirectParamA
GetDlgItemTextA
EndDialog
GetWindowRect
GetSystemMetrics
SetWindowPos
GetKeyState
PeekMessageA
TranslateMessage
DispatchMessageA
GetParent
SetDlgItemTextA
GetDlgItem
InvalidateRect
wsprintfA
MessageBoxA
SetCursor
CharNextA
RegisterClassA
SetTimer
kernel32
VirtualAlloc
HeapFree
HeapAlloc
HeapReAlloc
RtlUnwind
GetCommandLineA
GetModuleHandleA
SetErrorMode
GetSystemDirectoryA
LoadLibraryA
GetProcAddress
FreeLibrary
_lwrite
lstrcmpiA
GetVolumeInformationA
_lcreat
CreateFileA
CloseHandle
ExitProcess
GetSystemTime
WriteFile
GetModuleFileNameA
GetVersion
GlobalMemoryStatus
lstrcatA
FindClose
FindFirstFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
CreateDirectoryA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
LocalAlloc
_lopen
GetDriveTypeA
WinExec
lstrcpyA
lstrlenA
_lclose
GlobalLock
GlobalAlloc
GlobalFree
GlobalUnlock
GlobalHandle
LocalFree
GetEnvironmentVariableA
GetWindowsDirectoryA
_llseek
_lread
gdi32
SetBkColor
SetTextColor
SetTextAlign
GetBkColor
GetTextExtentPoint32A
ExtTextOutA
CreateDCA
GetDeviceCaps
CreateFontIndirectA
DeleteDC
SelectObject
DeleteObject
advapi32
RegQueryValueA
comctl32
ord17
Sections
.text Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ