Static task
static1
Behavioral task
behavioral1
Sample
8cd19a158dcc713f1c13684bfa12ae4a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8cd19a158dcc713f1c13684bfa12ae4a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8cd19a158dcc713f1c13684bfa12ae4a_JaffaCakes118
-
Size
72KB
-
MD5
8cd19a158dcc713f1c13684bfa12ae4a
-
SHA1
22c5571d632338d4e61a758f9e3e9a76b5a651af
-
SHA256
1d756fd26c8cab0e9e5f8f6b1ad73886bea815db901bbbfa118ffb51f23461eb
-
SHA512
91ae7e43c8de52271908b59047ad44d533ca22dc72a3a5f382beb0a95c11f4b5b293de7e442a96d45991d7c995c7a1f99f892e7caf28760db197dea238d71d4c
-
SSDEEP
1536:uQxpjtT8Nz3HvPq707UHSW6alcliy78Q:LT8tHvPq7jtJlclt7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8cd19a158dcc713f1c13684bfa12ae4a_JaffaCakes118
Files
-
8cd19a158dcc713f1c13684bfa12ae4a_JaffaCakes118.exe windows:4 windows x86 arch:x86
aa63262a51ced48e4eb3425d55979426
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
GetTempPathA
GetModuleFileNameA
GetShortPathNameA
GetVersionExA
CompareStringW
CompareStringA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
GetTimeZoneInformation
RtlUnwind
LocalFree
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
CreateProcessA
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
FreeLibrary
LoadLibraryA
GetProcAddress
GetExitCodeProcess
GetCurrentDirectoryA
GetFileType
SetCurrentDirectoryA
lstrcatA
lstrlenA
WinExec
CloseHandle
SetFilePointer
GetSystemDirectoryA
WriteFile
ReadFile
CreateFileA
GetLastError
GetEnvironmentVariableA
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
GetWindowsDirectoryA
FreeEnvironmentStringsW
SetFileAttributesA
GetFileAttributesA
ExitProcess
TerminateProcess
GetCurrentProcess
HeapCompact
HeapAlloc
HeapReAlloc
HeapFree
RemoveDirectoryA
DeleteFileA
FindFirstFileA
FindNextFileA
SetEnvironmentVariableA
user32
SendMessageA
GetWindow
GetSystemMetrics
CreateWindowExA
LoadIconA
LoadCursorA
RegisterClassA
CreateDialogParamA
GetDlgItem
DestroyWindow
PostQuitMessage
DefWindowProcA
CharToOemA
DialogBoxParamA
EndDialog
SetDlgItemTextA
TranslateMessage
DispatchMessageA
GetMessageA
IsDialogMessageA
SetWindowLongA
SetWindowTextA
MessageBoxA
wsprintfA
PeekMessageA
gdi32
DeleteObject
RemoveFontResourceA
GetObjectA
CreateFontIndirectA
GetStockObject
advapi32
RegSetValueExA
RegQueryValueExA
RegEnumKeyExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueA
RegOpenKeyA
RegCloseKey
shell32
SHGetPathFromIDListA
ShellExecuteA
SHGetSpecialFolderLocation
SHGetMalloc
ole32
OleUninitialize
OleInitialize
comctl32
ord17
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
bqgquaf Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE