Static task
static1
Behavioral task
behavioral1
Sample
97142b9917c668a0da63b7ac960e08d0_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
97142b9917c668a0da63b7ac960e08d0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
97142b9917c668a0da63b7ac960e08d0_JaffaCakes118
-
Size
116KB
-
MD5
97142b9917c668a0da63b7ac960e08d0
-
SHA1
081825d775161d0c44a005e980c80da57b12eab3
-
SHA256
ca8e4f7ea01054ff8c3a8643eab9027ac44cc185f4489cc25b231af4e3b952ff
-
SHA512
0ff42201ce7e97c835576c6f8b7f907c9b3c2781e9f0e55b2ed7cadb2761f4ad8c79331c5980ad8de561d67a83874e98f2d164ac75766b72901081527c4a132b
-
SSDEEP
1536:IeAZLLL1GXAQ5k7aGSV4bgvGCMU9zkBVitnWyKpXtP3u/yWFLEtgcA:dQB7eefitnWyKJle/fIa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 97142b9917c668a0da63b7ac960e08d0_JaffaCakes118
Files
-
97142b9917c668a0da63b7ac960e08d0_JaffaCakes118.exe windows:5 windows x86 arch:x86
19b65035124e5fb920433d9dcef3ed22
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetFolderPathA
shlwapi
StrStrA
StrChrA
kernel32
lstrlenA
lstrcmpA
AllocConsole
GetStdHandle
WriteFile
WriteConsoleA
ReadFile
ReadConsoleA
MultiByteToWideChar
HeapFree
lstrcmpiA
WideCharToMultiByte
HeapAlloc
SetConsoleMode
GetConsoleMode
GetLastError
GetModuleFileNameA
GetTimeFormatA
Sleep
CloseHandle
SizeofResource
LockResource
LoadResource
lstrcpyA
SetFilePointer
CreateFileA
CreateDirectoryA
GetFileAttributesA
GetSystemDefaultLCID
GetModuleHandleA
ReadConsoleInputA
lstrcatA
ExitProcess
WaitForSingleObject
SetConsoleCursorPosition
FillConsoleOutputCharacterA
GetConsoleScreenBufferInfo
PeekNamedPipe
lstrlenW
CreateProcessA
DuplicateHandle
GetCurrentProcess
CreatePipe
GetVersion
GetExitCodeProcess
TerminateProcess
GetTickCount
CreateThread
SetCurrentDirectoryA
DeleteFileA
GetCurrentDirectoryA
FindResourceA
lstrcmpW
GetCommandLineA
GetFileSize
GetProcessHeap
RemoveDirectoryA
lstrcatW
GetTempPathA
user32
GetWindowRect
DialogBoxParamA
CharLowerA
IsCharAlphaNumericA
GetDesktopWindow
GetParent
CharToOemA
MessageBoxA
CopyRect
OffsetRect
SetWindowPos
LoadStringA
SetDlgItemTextA
GetDlgItem
SetFocus
GetDlgItemTextA
EndDialog
wsprintfA
GetForegroundWindow
advapi32
RegQueryValueExA
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExW
ole32
CoUninitialize
CoGetObject
CLSIDFromProgID
CoCreateInstance
CoInitialize
oleaut32
VariantTimeToSystemTime
VarBstrFromCy
VarBstrFromR4
VarBstrFromR8
VarBstrFromDec
SafeArrayUnaccessData
LoadTypeLi
SysFreeString
VariantInit
SysAllocString
DispInvoke
DispGetIDsOfNames
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SysStringLen
SafeArrayAccessData
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ