Static task
static1
Behavioral task
behavioral1
Sample
8ba04a5cdaeebd541166eb9d07b9d583_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8ba04a5cdaeebd541166eb9d07b9d583_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8ba04a5cdaeebd541166eb9d07b9d583_JaffaCakes118
-
Size
148KB
-
MD5
8ba04a5cdaeebd541166eb9d07b9d583
-
SHA1
20a3da447b4bd6bc1e7650e5b6876e6f22930655
-
SHA256
9eabccd713fc76c6f90103020facaf79efc4d14c96b22586b2649e4d614567f7
-
SHA512
355b7edfdb0f59b267255a8c58fb4c2c8cf62308285eedbe8a2db2b0511e33b4927f0348a9b0f7eff6ca48c6d203ed848ba6b7c1a6c97cc9fb81e5e19e9d6369
-
SSDEEP
3072:Q0b8SS/gVMWdvuApbXAqf0Nqi9oWE0CEGnow:bVM6u2ArjbTw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8ba04a5cdaeebd541166eb9d07b9d583_JaffaCakes118
Files
-
8ba04a5cdaeebd541166eb9d07b9d583_JaffaCakes118.exe windows:4 windows x86 arch:x86
7fee2047dc3a2dde9def4849811aa124
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
DestroyPropertySheetPage
CreatePropertySheetPageA
kernel32
LoadLibraryA
lstrcpyA
InitializeCriticalSection
WaitForMultipleObjects
CloseHandle
CreateEventA
WaitForSingleObject
GetProcAddress
lstrcatA
IsDBCSLeadByte
CreateFileA
CopyFileA
GetSystemDirectoryA
GetVersionExA
GetModuleFileNameA
lstrcpynA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
WideCharToMultiByte
GetLocaleInfoA
GetSystemDefaultLCID
GetLastError
VirtualFree
FlushFileBuffers
SetStdHandle
ReadFile
SetFilePointer
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
WriteFile
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
IsBadWritePtr
VirtualAlloc
InterlockedDecrement
HeapCreate
HeapDestroy
GetEnvironmentVariableA
HeapSize
GetCurrentProcess
TerminateProcess
ExitProcess
GetVersion
GetStartupInfoA
RaiseException
HeapReAlloc
HeapAlloc
HeapFree
RtlUnwind
LocalFree
GetShortPathNameA
InterlockedIncrement
lstrlenA
MultiByteToWideChar
lstrlenW
GetCommandLineA
GetCurrentThreadId
lstrcmpiA
CreateMutexA
GetModuleHandleA
CreateThread
CompareFileTime
user32
KillTimer
DefWindowProcA
GetSystemMetrics
DispatchMessageA
BroadcastSystemMessage
SendMessageA
GetParent
SetRectEmpty
GetMessageA
PostMessageA
CreateWindowExA
RegisterClassA
CharNextA
ChangeDisplaySettingsA
EnableWindow
GetDlgCtrlID
EndDialog
GetDlgItem
SetWindowTextA
WinHelpA
LoadStringA
GetWindowRect
EnableMenuItem
EqualRect
EnumChildWindows
CallWindowProcA
PostQuitMessage
SetTimer
FindWindowA
PeekMessageA
ChangeDisplaySettingsExA
EnumDisplaySettingsA
GetSystemMenu
wsprintfA
SetWindowLongA
DialogBoxParamA
gdi32
DeleteDC
GetDeviceCaps
CreateDCA
advapi32
RegSetValueExA
RegDeleteValueA
RegQueryValueExA
RegEnumValueA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegCreateKeyExA
RegOpenKeyA
RegCloseKey
ole32
CoTaskMemRealloc
CoRegisterClassObject
CoRevokeClassObject
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
VarUI4FromStr
LoadTypeLi
VariantClear
SysAllocString
SysStringByteLen
SysAllocStringByteLen
RegisterTypeLi
SysFreeString
SysStringLen
hccutils
GetCommonRegKey
EnumDspDev
GetHardwareKey
ReleaseClassDevice
FindResources
IsDisplayValid
LoadDialogString
LoadSTRING
EnumDeviceByClass
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
axgpcux Size: 8KB - Virtual size: 72KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE