Static task
static1
Behavioral task
behavioral1
Sample
8b78a867c6639edebdc3e11b7c4c95b1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8b78a867c6639edebdc3e11b7c4c95b1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8b78a867c6639edebdc3e11b7c4c95b1_JaffaCakes118
-
Size
51KB
-
MD5
8b78a867c6639edebdc3e11b7c4c95b1
-
SHA1
73f2954d7fabd41d9d284bc224955388d0b4352d
-
SHA256
5c626fa7447ede06113d79dcdcccbafebf8afdf29d12cf11c980b95827e9e1a5
-
SHA512
67a69c0e42d9a13c10f83898bcb80ff3e7bcd17cb5cea5c58570a4649385019b78bd8ac8ed9cacb46bdc31616755e86fd908397d87997fa457050f6af09e8b84
-
SSDEEP
1536:TPJzJIeAX2XCqrctgIVaAIe0Yr4XOxEVoGMoId9zx:TPbeLgLWb8XOm6fdBx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b78a867c6639edebdc3e11b7c4c95b1_JaffaCakes118
Files
-
8b78a867c6639edebdc3e11b7c4c95b1_JaffaCakes118.exe windows:4 windows x86 arch:x86
b3dd91c9ee74b030a3455724125926c9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceA
SetThreadLocale
GetUserDefaultLCID
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
DeleteFileA
GetTempFileNameA
GetTempPathA
lstrlenW
InterlockedDecrement
GetStringTypeExA
GetThreadLocale
HeapCreate
InitializeCriticalSection
FlushInstructionCache
ReadFile
LoadResource
CreateFileA
WriteFile
GetProcAddress
GetVolumeInformationA
GetComputerNameA
FindClose
FindFirstFileA
GetWindowsDirectoryA
GetFileAttributesA
GetSystemTime
GetSystemDirectoryA
FindNextFileA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
SizeofResource
FreeResource
GetVersionExA
GetCurrentProcess
GetLastError
GetShortPathNameA
GetEnvironmentVariableA
LoadLibraryA
GetModuleFileNameA
OpenEventA
CreateEventA
CloseHandle
WaitForSingleObject
GetExitCodeProcess
SetEvent
InterlockedIncrement
lstrlenA
HeapFree
HeapAlloc
GetCommandLineA
ExitProcess
GetStartupInfoA
GetFileSize
GetModuleHandleA
user32
GetWindowTextA
GetWindowTextLengthA
UpdateWindow
InvalidateRect
RedrawWindow
ScreenToClient
ClientToScreen
CharLowerA
LoadStringW
GetWindowLongA
GetParent
GetWindow
GetWindowRect
SystemParametersInfoA
GetClientRect
SetCursor
SetWindowPos
SetWindowLongA
LoadStringA
wvsprintfA
SetTimer
SetWindowTextA
SetDlgItemTextA
IsDlgButtonChecked
GetSystemMetrics
LoadImageA
SendMessageA
GetDlgItem
CheckDlgButton
EndDialog
DefWindowProcA
GetMessageA
GetActiveWindow
CallWindowProcA
MapWindowPoints
GetSysColor
DialogBoxParamA
MessageBoxA
CharNextA
PostMessageA
gdi32
SetTextColor
GetStockObject
CreateFontIndirectA
CreateSolidBrush
DeleteObject
GetObjectA
advapi32
OpenServiceA
LsaClose
LsaOpenPolicy
GetTokenInformation
OpenProcessToken
RegCloseKey
RegSetValueExA
RegCreateKeyExA
GetUserNameA
CloseServiceHandle
ChangeServiceConfigA
RegOpenKeyExA
OpenSCManagerA
CreateWellKnownSid
RegQueryValueExA
LsaAddAccountRights
shell32
ShellExecuteA
ShellExecuteExA
ole32
CoInitialize
comctl32
InitCommonControlsEx
wininet
InternetQueryDataAvailable
InternetOpenA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetCloseHandle
InternetReadFile
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetConnectA
Sections
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ