Static task
static1
Behavioral task
behavioral1
Sample
a1da6cb619a9f117b101f129b329d82f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a1da6cb619a9f117b101f129b329d82f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a1da6cb619a9f117b101f129b329d82f_JaffaCakes118
-
Size
510KB
-
MD5
a1da6cb619a9f117b101f129b329d82f
-
SHA1
88b7d1b256c4c50252be9f5291a649b28d8e7cef
-
SHA256
2cfc8611164d6840fd21c810a62c8f6095144ab0c27e1a090c17594827e1cad6
-
SHA512
d20e16e848788b21416a702a8347040d49005f4f9d5012ec6473f8f4fd34ea02a64a154f79582c358e16acfa47c1a76b937094897858152ba08136abcea7bc8a
-
SSDEEP
6144:Ot107uf3OpsU6IHFyAt7gE0BY6yXTnwtgYoJCKNVXbejmtP/yKjPvSzj6BicJhI9:Otjmp3AA7RTqoJ7zLFjXSzj2in9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a1da6cb619a9f117b101f129b329d82f_JaffaCakes118
Files
-
a1da6cb619a9f117b101f129b329d82f_JaffaCakes118.exe windows:4 windows x86 arch:x86
3aae8ddfef6295739b2747985c5581ff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharNextW
RegisterClassExA
IsCharUpperW
InsertMenuItemW
GetScrollInfo
SetMessageQueue
EnumDisplaySettingsW
RegisterClassA
DefDlgProcA
WaitMessage
EnumDesktopsW
SetScrollPos
GetKeyboardLayoutNameA
LookupIconIdFromDirectoryEx
DestroyIcon
DdeGetData
GetKeyboardState
CopyAcceleratorTableA
DdeSetUserHandle
comdlg32
ReplaceTextW
FindTextW
PrintDlgA
GetOpenFileNameW
kernel32
HeapFree
GetLocaleInfoA
GlobalGetAtomNameA
GetModuleFileNameA
FreeEnvironmentStringsW
CreateFileA
LeaveCriticalSection
SetStdHandle
FreeLibrary
WriteConsoleW
GetComputerNameA
WideCharToMultiByte
CompareStringW
GetEnvironmentStrings
LCMapStringA
SetEnvironmentVariableA
HeapAlloc
GetCurrentProcessId
IsValidLocale
UnhandledExceptionFilter
GetCurrentThreadId
OpenMutexA
SetConsoleCtrlHandler
GetConsoleMode
GetACP
TlsAlloc
InterlockedDecrement
GetProfileIntW
DeleteCriticalSection
CloseHandle
VirtualFree
SetHandleCount
GetTempFileNameW
WriteFile
GetProcAddress
EnumResourceTypesW
CompareStringA
GetDiskFreeSpaceExA
CreateSemaphoreW
GetProcessHeap
WriteConsoleA
FlushFileBuffers
GetOEMCP
GetCPInfo
FreeEnvironmentStringsA
GetEnvironmentStringsW
InterlockedExchange
MoveFileA
GetUserDefaultLCID
EnumSystemLocalesA
TerminateProcess
VirtualQuery
SetFilePointer
MultiByteToWideChar
GetConsoleOutputCP
GetLastError
RtlUnwind
HeapReAlloc
GetCurrentThread
WaitForSingleObjectEx
VirtualAlloc
HeapCreate
LoadLibraryA
OutputDebugStringW
GetTimeZoneInformation
WriteProfileStringA
FileTimeToLocalFileTime
GetFileType
GetModuleHandleA
GetVersionExA
TlsFree
TlsSetValue
GetStringTypeA
GetStringTypeW
GetCurrentProcess
GetTickCount
GetConsoleCP
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
GetStartupInfoA
HeapDestroy
ExitProcess
FoldStringA
EnterCriticalSection
LCMapStringW
GetProfileIntA
Sleep
GetTimeFormatA
QueryPerformanceCounter
GetStdHandle
SetLastError
IsDebuggerPresent
GetDateFormatA
CreateDirectoryW
CreateMutexA
ReadFile
HeapSize
IsValidCodePage
GetCommandLineA
GetUserDefaultLangID
InterlockedIncrement
GetLongPathNameW
GetLocaleInfoW
TlsGetValue
GetFullPathNameA
InitializeCriticalSection
comctl32
ImageList_LoadImageW
ImageList_SetFlags
InitMUILanguage
ImageList_Add
ImageList_Merge
ImageList_ReplaceIcon
ImageList_GetIcon
ImageList_DragShowNolock
InitCommonControlsEx
ImageList_AddIcon
ImageList_DrawIndirect
Sections
.text Size: 330KB - Virtual size: 330KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ