Static task
static1
Behavioral task
behavioral1
Sample
89aac62f555523d74daa8bd5b5e02d4b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
89aac62f555523d74daa8bd5b5e02d4b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
89aac62f555523d74daa8bd5b5e02d4b_JaffaCakes118
-
Size
2.4MB
-
MD5
89aac62f555523d74daa8bd5b5e02d4b
-
SHA1
e0a7581820f31c491ac1f4d4e3897ce6e641ba7a
-
SHA256
21d2de840335f5a36724973e42bab0c2a62abc9e417f6817d580c627f665af14
-
SHA512
d6eea9eb1101c3bebc26380a41b2d8c1fb7c05b993fbf15f93f268dc65912b67ea049d56c1d3cde5695f9da2a6f08ec47b0013562a69aeaee61e58220a80673b
-
SSDEEP
49152:YkFulIgnK5Wg7Ss4XFHshI5NTjv/MOVQoCafGXFDZy+jxh1kufNCfa8B5UD/jc9i:hFZaK5Wg7bimCj3VIXFldjWufNCfa8w9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 89aac62f555523d74daa8bd5b5e02d4b_JaffaCakes118
Files
-
89aac62f555523d74daa8bd5b5e02d4b_JaffaCakes118.exe windows:4 windows x86 arch:x86
cd524e7a94466a0e2707ea712e9f9042
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
CopyFileA
GetDiskFreeSpaceA
GetModuleFileNameA
GetModuleHandleA
SetEnvironmentVariableA
CompareStringW
CompareStringA
IsBadCodePtr
CreateFileA
GetProcAddress
FlushFileBuffers
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
VirtualQuery
GetLastError
MultiByteToWideChar
MulDiv
GetExitCodeProcess
Sleep
GetSystemDirectoryA
WideCharToMultiByte
LocalFileTimeToFileTime
CloseHandle
SetFileAttributesA
LoadLibraryA
SetFileTime
DosDateTimeToFileTime
CreateDirectoryA
RemoveDirectoryA
IsBadReadPtr
GetSystemInfo
VirtualProtect
GetCPInfo
GetLocaleInfoA
InitializeCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FindClose
FindFirstFileA
FindNextFileA
DeleteFileA
HeapFree
GetFileType
HeapAlloc
ReadFile
SetFilePointer
WriteFile
ExitThread
TlsSetValue
TlsGetValue
ResumeThread
CreateThread
ExitProcess
TerminateProcess
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
RtlUnwind
RaiseException
HeapReAlloc
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
IsBadWritePtr
SetEndOfFile
SetHandleCount
GetStdHandle
SetStdHandle
HeapSize
LCMapStringA
LCMapStringW
TlsFree
SetLastError
GetCurrentThreadId
TlsAlloc
GetFileAttributesA
UnhandledExceptionFilter
FreeEnvironmentStringsA
user32
DialogBoxParamA
GetWindowTextA
LoadImageA
EndPaint
SetTimer
FillRect
GetClientRect
SendMessageA
SetWindowTextA
GetDC
BeginPaint
MessageBoxA
ReleaseDC
GetDlgItem
EndDialog
GetDesktopWindow
EnumChildWindows
GetSysColorBrush
IsDlgButtonChecked
gdi32
SetTextColor
DeleteDC
CreateFontA
GetDeviceCaps
SetBkColor
DeleteObject
SelectObject
CreateCompatibleDC
GetObjectA
CreateSolidBrush
BitBlt
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
shell32
SHGetPathFromIDListA
ShellExecuteA
ShellExecuteExA
SHBrowseForFolderA
SHGetMalloc
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
VariantInit
VariantClear
Sections
.text Size: 132KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ