Static task
static1
Behavioral task
behavioral1
Sample
8e74eb4bc0f6326d5d036a8ceea4af33_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8e74eb4bc0f6326d5d036a8ceea4af33_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8e74eb4bc0f6326d5d036a8ceea4af33_JaffaCakes118
-
Size
157KB
-
MD5
8e74eb4bc0f6326d5d036a8ceea4af33
-
SHA1
039f52ba9f13fa5f95f19585e7e13cb3746e9f25
-
SHA256
890bc54798f888efbbfba882a122a1b146517775edb850632c3cc6beb6d40acf
-
SHA512
ccfb3dc9f30ec0119897d886b38b00c47677822e47d70d92c773d0b77652d3354d411804558cff76d78c893feb93087d373cebf027c662c26eb0f919e93a7079
-
SSDEEP
3072:azka3QMHAjUWsWpx4oUQU/3pKAgtLG2/zfY0n:wka31HuUWP6oUQU/3pKpB/zf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e74eb4bc0f6326d5d036a8ceea4af33_JaffaCakes118
Files
-
8e74eb4bc0f6326d5d036a8ceea4af33_JaffaCakes118.exe windows:4 windows x86 arch:x86
60e06f12ecaf7d4b85de78487cebada3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
LocalAlloc
lstrcpynA
_lwrite
_lcreat
GetFileType
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
RtlUnwind
GetCurrentProcess
TerminateProcess
ExitProcess
HeapCreate
GetVersion
GetStartupInfoA
GetModuleHandleA
HeapFree
HeapAlloc
UnmapViewOfFile
_lopen
_lread
_lclose
GetCommandLineA
CreateFileMappingA
MapViewOfFile
GetModuleFileNameA
LoadLibraryA
GetProcAddress
FreeLibrary
lstrcmpA
GetTempPathA
FindResourceA
SizeofResource
LoadResource
LockResource
SystemTimeToFileTime
SetFileTime
WriteFile
ReadFile
GetVersionExA
lstrlenA
lstrcpyA
lstrcatA
CreateFileA
DeviceIoControl
FreeEnvironmentStringsW
CloseHandle
GetStdHandle
user32
SetCapture
SetDlgItemTextA
GetWindowRect
CreateDialogIndirectParamA
InvalidateRect
SetWindowTextA
GetDlgItemTextA
DrawTextExA
SetRect
GetMessageTime
SetWindowRgn
MoveWindow
InvertRect
MessageBeep
SetActiveWindow
GetWindow
GetDesktopWindow
RegisterClassA
LoadIconA
UnregisterClassA
ModifyMenuA
DestroyMenu
TrackPopupMenu
AppendMenuA
GetSubMenu
LoadMenuA
GetCapture
ScreenToClient
DrawIconEx
InflateRect
SetCursor
CheckDlgButton
EnableWindow
CheckRadioButton
GetDlgItem
GetDialogBaseUnits
SetWindowPos
WinHelpA
GetSystemMetrics
DefWindowProcA
UnregisterHotKey
DestroyWindow
PostQuitMessage
LoadBitmapA
DrawEdge
GetSysColorBrush
DrawStateA
CopyRect
OffsetRect
SetFocus
EndDialog
GetCursorPos
wsprintfA
MessageBoxA
SetWindowLongA
LoadCursorA
CharUpperA
FindWindowA
SetForegroundWindow
PostMessageA
GetForegroundWindow
ClientToScreen
PtInRect
GetWindowLongA
CallWindowProcA
EndPaint
CreateWindowExA
RegisterHotKey
LoadImageA
DialogBoxParamA
TranslateMessage
DispatchMessageA
GetMessageA
CreateDialogParamA
ShowWindow
GetDC
ReleaseDC
FillRect
DrawTextA
BeginPaint
GetClientRect
GetSysColor
SendMessageA
ReleaseCapture
gdi32
AddFontResourceA
EnumFontFamiliesA
GetTextExtentPoint32A
SetBkColor
GetBkColor
CreateSolidBrush
BitBlt
CreateCompatibleDC
GetObjectA
TextOutA
CreatePolygonRgn
CreateFontIndirectA
SetBkMode
SetTextColor
CreatePen
MoveToEx
LineTo
DeleteDC
DeleteObject
SelectObject
comdlg32
GetSaveFileNameA
GetOpenFileNameA
advapi32
RegDeleteValueA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
shell32
Shell_NotifyIconA
ShellExecuteA
ole32
CoCreateInstance
CoInitialize
comctl32
ord17
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ