Static task
static1
Behavioral task
behavioral1
Sample
a719e88595c4e036401c0758369a12bf_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a719e88595c4e036401c0758369a12bf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a719e88595c4e036401c0758369a12bf_JaffaCakes118
-
Size
100KB
-
MD5
a719e88595c4e036401c0758369a12bf
-
SHA1
5d8e61a1c95df1830717ae350ce06489e2dcc991
-
SHA256
c915c2e10b3bd7a4af9720ef19abe94a6b97b49bbdb46fd70bf3eafbda5c389f
-
SHA512
83a2301c6b5aaf2cf7883015b312871a730b1483af144d4ac3677d9c60016c4836513a6418235ff61ae838a38c50e6956a38c3bd0830911bc0e1d02e604a2d10
-
SSDEEP
1536:0JqYxLcg0w/vKUGAhDBJ9Nf1ctcGO0QHRBUNlTP0:07Rj9Th1j0QHRB6lTs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a719e88595c4e036401c0758369a12bf_JaffaCakes118
Files
-
a719e88595c4e036401c0758369a12bf_JaffaCakes118.exe windows:4 windows x86 arch:x86
5bc54cdd37385b791f83ffaadfbbc4ff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msi
ord172
ord67
ord36
kernel32
GetFileAttributesW
GetVersion
LeaveCriticalSection
EnterCriticalSection
SetEvent
GetLogicalDrives
CloseHandle
GetCurrentProcess
GetLastError
LocalFree
FormatMessageA
WaitForMultipleObjects
SetLastError
GetModuleFileNameW
OutputDebugStringA
FreeLibrary
ReleaseMutex
WaitForSingleObject
CreateThread
CreateEventA
InitializeCriticalSection
OpenMutexA
GetShortPathNameA
GetModuleFileNameA
GetCommandLineA
GetWindowsDirectoryA
GetSystemDirectoryA
GetVersionExA
InterlockedExchange
HeapSize
SetStdHandle
GetSystemTimeAsFileTime
GetProcAddress
GetTickCount
QueryPerformanceCounter
SetFilePointer
HeapReAlloc
GetSystemInfo
VirtualAlloc
VirtualProtect
GetLocaleInfoA
VirtualFree
HeapCreate
HeapDestroy
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
WriteFile
FlushFileBuffers
TerminateProcess
ExitProcess
VirtualQuery
RtlUnwind
GetModuleHandleW
GetModuleHandleA
LoadLibraryW
LoadLibraryA
GetCurrentProcessId
GetStringTypeW
GetStringTypeA
HeapAlloc
GetStartupInfoA
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetACP
GetOEMCP
GetCPInfo
TlsAlloc
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
HeapFree
user32
FindWindowA
LoadImageA
GetMessageA
DispatchMessageA
DestroyIcon
LoadCursorA
DefWindowProcA
RegisterWindowMessageA
CreatePopupMenu
AppendMenuA
wsprintfA
GetCursorPos
TrackPopupMenu
PostMessageA
DestroyMenu
SetWindowLongA
GetDlgItemTextA
DialogBoxParamA
CreateWindowExA
RegisterClassExA
RegisterClassA
GetParent
GetWindowRect
GetSystemMetrics
MoveWindow
PostQuitMessage
MessageBoxA
ExitWindowsEx
DestroyWindow
GetWindowLongA
GetDlgItem
EnableWindow
EndDialog
SendMessageA
SendDlgItemMessageA
ShowWindow
SetForegroundWindow
TranslateMessage
advapi32
RegOpenKeyExA
RegDeleteValueA
RegSetValueExA
RegCloseKey
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
RegQueryValueExA
shell32
ShellExecuteA
Shell_NotifyIconA
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE