Static task
static1
Behavioral task
behavioral1
Sample
9610fbbf443fc448de51acca28b24996_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9610fbbf443fc448de51acca28b24996_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9610fbbf443fc448de51acca28b24996_JaffaCakes118
-
Size
36KB
-
MD5
9610fbbf443fc448de51acca28b24996
-
SHA1
de3cbda90e7a93bc02daabe7276ca15658246f1c
-
SHA256
6c412dc069607fa271c8065254e987e11225f6008e59fd8581d6ee5ecafa4a61
-
SHA512
7eeaad72305fa0b164d85ff50fd0bb0fd32fba1798b724b21b599f3ad4a41469e27d7b903d9c480a84b357a29a7c5834b4018bc6e15c80e43dafe46704aae2dd
-
SSDEEP
768:KYOL1nxyZYJKGBq2vcpZMi0q75xvZr8Jf48p2AkYwm:KYKxyKRzvcpn0ijJwpr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9610fbbf443fc448de51acca28b24996_JaffaCakes118
Files
-
9610fbbf443fc448de51acca28b24996_JaffaCakes118.exe windows:5 windows x86 arch:x86
521bad73777c0864ed66239f6ae53792
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
InterlockedCompareExchange
lstrcmpiW
lstrlenA
VirtualProtect
InterlockedExchange
InterlockedCompareExchange
CreateThread
GetCurrentProcessId
LocalFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetSystemTimeAsFileTime
CreateThread
MultiByteToWideChar
HeapFree
GetModuleFileNameW
CreateThread
FreeLibrary
InterlockedIncrement
CreateFileW
GetModuleFileNameW
GetModuleHandleA
Sleep
CreateEventW
QueryPerformanceCounter
DeleteCriticalSection
HeapAlloc
LoadLibraryA
CreateThread
SetLastError
VirtualProtect
LoadLibraryA
ReadFile
LeaveCriticalSection
CreateFileW
GetSystemTimeAsFileTime
FreeLibrary
FreeLibrary
InterlockedExchange
QueryPerformanceCounter
GetLastError
InterlockedCompareExchange
LoadLibraryA
CreateEventW
GetCurrentProcess
lstrlenA
GetModuleFileNameA
DeleteCriticalSection
InterlockedExchange
CreateEventW
LoadLibraryW
LocalFree
VirtualProtect
QueryPerformanceCounter
GetCurrentProcess
LoadLibraryW
LocalFree
VirtualProtect
InterlockedIncrement
GetProcessHeap
DisableThreadLibraryCalls
InitializeCriticalSection
GetModuleFileNameA
DisableThreadLibraryCalls
lstrlenA
LocalAlloc
EnterCriticalSection
user32
EnableWindow
EndPaint
LoadStringW
GetDesktopWindow
GetWindowLongW
LoadStringW
MessageBoxW
LoadIconW
PostQuitMessage
SetForegroundWindow
wsprintfA
BeginPaint
GetParent
PostQuitMessage
GetWindowLongW
LoadIconW
ShowWindow
EndPaint
SetWindowPos
DefWindowProcW
DispatchMessageW
DispatchMessageW
EndPaint
SetForegroundWindow
EndPaint
SetTimer
GetClientRect
SetFocus
LoadCursorW
BeginPaint
DialogBoxParamW
DispatchMessageW
EnableWindow
ReleaseDC
LoadIconW
GetFocus
EnableWindow
SetWindowLongW
CreateWindowExW
GetDlgItem
InvalidateRect
MessageBoxW
ReleaseDC
MessageBoxW
DialogBoxParamW
GetDesktopWindow
MessageBoxW
EndDialog
DispatchMessageW
EndDialog
GetDlgItem
SetForegroundWindow
DialogBoxParamW
GetDlgItem
DestroyWindow
SetWindowPos
SetCursor
GetWindowRect
GetFocus
GetDlgItem
SetWindowTextW
SetTimer
GetDC
SetDlgItemTextW
GetWindowRect
EnableWindow
GetParent
TranslateMessage
CharNextW
Sections
.text Size: 27KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ