Static task
static1
Behavioral task
behavioral1
Sample
a16742492518e01fd00d568726891c60_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a16742492518e01fd00d568726891c60_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a16742492518e01fd00d568726891c60_JaffaCakes118
-
Size
2.2MB
-
MD5
a16742492518e01fd00d568726891c60
-
SHA1
107cf5722e37f9860fa0a71a74c75c24a64c4212
-
SHA256
9a01cdfd0475d6de728d2a8f9cb43f85335eb8b830c960810d33d1d1d11462f8
-
SHA512
dedbb26fd829b876f141e9d71950ca3a20fa9a6eae9523bc33f59ccb18e727959f30e8782ae6961c1ee27767cd9d16bc3ac883eff2f0d3d1aa8c14cc183de249
-
SSDEEP
49152:pdBtthGqIYq+x6wX7N7hfc52DZPTPLcbuPqn5fj:p7M5Yq+nXh7hE5yZbPLcbuPqn5f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a16742492518e01fd00d568726891c60_JaffaCakes118
Files
-
a16742492518e01fd00d568726891c60_JaffaCakes118.exe windows:4 windows x86 arch:x86
df54dbfa6330bd64c8b440af25dd87cb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
comctl32
ord17
mpr
WNetCloseEnum
WNetOpenEnumA
WNetEnumResourceA
kernel32
GetModuleHandleA
GetSystemInfo
GetVersionExA
SetLastError
WideCharToMultiByte
GetComputerNameA
CloseHandle
ReadFile
CreateFileA
GetCurrentProcess
Sleep
ReleaseMutex
GetExitCodeProcess
CreateProcessA
CopyFileA
GetLocalTime
GetDriveTypeA
SetFileAttributesA
GetFileAttributesA
GetEnvironmentVariableA
CreateMutexA
GetModuleFileNameA
ExpandEnvironmentStringsA
LoadLibraryA
LocalFree
FormatMessageA
lstrlenA
QueryPerformanceCounter
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetCPInfo
FlushFileBuffers
SetStdHandle
InterlockedExchange
RtlUnwind
InitializeCriticalSection
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
VirtualQuery
VirtualProtect
GetTimeZoneInformation
LCMapStringW
GetLastError
GetProcAddress
GetCurrentProcessId
SetEndOfFile
HeapSize
CreateDirectoryA
GetTickCount
FreeLibrary
CompareStringA
CompareStringW
SetEnvironmentVariableA
WaitForSingleObject
HeapFree
HeapAlloc
ExitThread
GetCurrentThreadId
CreateThread
DeleteFileA
HeapReAlloc
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
WriteFile
SetHandleCount
GetStdHandle
GetFileType
SetFilePointer
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
ExitProcess
TerminateProcess
UnhandledExceptionFilter
LCMapStringA
MultiByteToWideChar
user32
GetMessageA
TranslateMessage
DispatchMessageA
ExitWindowsEx
DialogBoxParamA
KillTimer
LoadIconA
SendMessageA
DestroyIcon
SetTimer
PeekMessageA
GetDlgItemTextA
MessageBoxA
SetWindowTextA
SetDlgItemTextA
EnableWindow
GetDlgItem
ShowWindow
GetWindowPlacement
SetWindowPlacement
GetSystemMetrics
SetForegroundWindow
CreateWindowExA
EndDialog
advapi32
AdjustTokenPrivileges
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
RegQueryInfoKeyA
GetUserNameA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
Sections
.text Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ