Static task
static1
Behavioral task
behavioral1
Sample
89328b7412fa347b430ca4b300050d07_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
89328b7412fa347b430ca4b300050d07_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
89328b7412fa347b430ca4b300050d07_JaffaCakes118
-
Size
73KB
-
MD5
89328b7412fa347b430ca4b300050d07
-
SHA1
fbeb58db14226961a7b5dd57bf425a4b8ebf2243
-
SHA256
738dc28e7d43dab17d31a399612637a397e9cc68960ac089cef24f23896710ba
-
SHA512
4aa01b1cef4bc95c82deaf63e4384d03f8d4a7069b202aaa384e378027b072205f73be014c1ca9750ea141fdf4fbcc38dcb85772aa3f7e1ba7429f98d15df8b3
-
SSDEEP
1536:GNXAtz++7D9PWA2QOGcmP2XJfkvLco8scFYM6dN:Gk9uUrJPwJ2Lco8sXN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 89328b7412fa347b430ca4b300050d07_JaffaCakes118
Files
-
89328b7412fa347b430ca4b300050d07_JaffaCakes118.exe windows:5 windows x86 arch:x86
d77da411fbf18f745693026ba8a86fe1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SizeofResource
LockResource
LoadResource
GlobalAlloc
GlobalLock
InterlockedExchange
GetVersionExW
GetProcAddress
GetModuleHandleW
CloseHandle
OpenProcess
LoadLibraryW
Sleep
GetExitCodeProcess
TerminateProcess
CreateProcessW
GetModuleFileNameW
CreateFileW
ReadFile
WriteFile
FindResourceW
GetStringTypeW
MultiByteToWideChar
LCMapStringW
HeapReAlloc
IsProcessorFeaturePresent
RtlUnwind
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
WideCharToMultiByte
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
EnterCriticalSection
LeaveCriticalSection
lstrlenW
GetTickCount
GetSystemTime
VirtualFree
VirtualProtect
VirtualAlloc
CreateThread
GetLastError
CreateMutexA
SetProcessPriorityBoost
SetThreadPriority
SetPriorityClass
lstrcatA
GetCurrentProcess
GetEnvironmentVariableA
lstrcpyA
GetShortPathNameA
GetModuleFileNameA
RaiseException
HeapCreate
GetStdHandle
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
EncodePointer
GetStartupInfoW
HeapSetInformation
GetCommandLineW
HeapFree
VirtualQuery
GetSystemInfo
HeapAlloc
DecodePointer
ExitProcess
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
user32
SetWindowsHookExW
SystemParametersInfoW
LoadAcceleratorsW
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
LoadIconW
LoadCursorW
RegisterClassExW
GetSystemMetrics
CreateWindowExW
SetCursor
EndPaint
BeginPaint
DefWindowProcW
CallNextHookEx
SetWindowTextW
GetWindowTextW
gdi32
GetObjectW
CreateCompatibleDC
SetDIBColorTable
DeleteDC
LineTo
MoveToEx
Rectangle
CreatePen
TextOutW
SelectObject
SetTextColor
SetBkMode
BitBlt
CreateFontW
DeleteObject
CreateDIBSection
advapi32
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
shell32
ShellExecuteExA
ole32
CreateStreamOnHGlobal
shlwapi
StrCmpW
StrCatW
StrCpyW
psapi
EnumProcesses
EnumProcessModules
GetModuleBaseNameW
gdiplus
GdiplusStartup
GdipCreateBitmapFromStream
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipGetImagePaletteSize
GdipGetImagePalette
GdipBitmapLockBits
GdiplusShutdown
GdipDrawImageI
GdipDeleteGraphics
GdipGetImageGraphicsContext
GdipDisposeImage
GdipFree
GdipAlloc
GdipCloneImage
GdipCreateBitmapFromScan0
GdipBitmapUnlockBits
Sections
.text Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ