Static task
static1
Behavioral task
behavioral1
Sample
a7b771021263426982166b0dae8c400e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a7b771021263426982166b0dae8c400e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a7b771021263426982166b0dae8c400e_JaffaCakes118
-
Size
205KB
-
MD5
a7b771021263426982166b0dae8c400e
-
SHA1
ebb0ebb4a8686d7b87af2ae96a75af96ea0455dc
-
SHA256
96b7cffe16d6875b2fdadaa24710e454dad92a8a7c80b6a65e86a23e111b2e8e
-
SHA512
b8388b15d5ac6701b91b6d6fea9999b6f77d5eff36ed453c285d02f8e952016486556d2459b836ffe03d9ffc9279caac443ea46ba38df4107adb72f11a5280fb
-
SSDEEP
6144:oyEN+HHNHzzj7tHVp1126bOYY56Tx6/uzUv:oy82JzzjZ1b126nYcTQv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a7b771021263426982166b0dae8c400e_JaffaCakes118
Files
-
a7b771021263426982166b0dae8c400e_JaffaCakes118.exe windows:4 windows x86 arch:x86
322be9ffed591775d893e6fcf0e9964e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EnableWindow
SetDlgItemTextA
GetDlgItem
SendMessageA
SetWindowTextW
EndDialog
DialogBoxParamW
DialogBoxParamA
SetWindowLongA
GetWindowLongA
GetWindowTextLengthW
GetWindowTextW
GetWindowTextLengthA
GetWindowTextA
SetTimer
SendMessageW
LoadStringW
LoadStringA
CharPrevA
CharUpperW
CharUpperA
PostMessageA
CheckRadioButton
IsWindowEnabled
SetWindowTextA
IsDlgButtonChecked
ShowWindow
CheckDlgButton
MessageBoxW
MessageBoxA
wsprintfA
KillTimer
advapi32
RegDeleteValueW
RegQueryValueExW
RegQueryValueExA
RegSetValueExW
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
oleaut32
SysAllocString
VariantClear
VariantCopy
SysStringByteLen
SysFreeString
shell32
SHGetFileInfoA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
comctl32
ord17
ole32
CoInitialize
CoUninitialize
comdlg32
GetOpenFileNameA
GetOpenFileNameW
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_except_handler3
_beginthreadex
memset
_iob
free
malloc
memcpy
wcslen
memcmp
_purecall
memmove
_CxxThrowException
__CxxFrameHandler
_isatty
_fileno
kernel32
SetPriorityClass
GetDriveTypeA
FileTimeToLocalFileTime
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
OpenEventA
GetStdHandle
GetSystemTime
SystemTimeToFileTime
FileTimeToDosDateTime
GetModuleHandleA
GlobalMemoryStatus
GetSystemInfo
GetModuleHandleW
FileTimeToSystemTime
CompareFileTime
GetProcAddress
GetProcessTimes
SetEndOfFile
WriteFile
ReadFile
SetFilePointer
GetFileSize
CreateFileA
VirtualAlloc
VirtualFree
WaitForSingleObject
CreateEventA
SetEvent
InitializeCriticalSection
GetStartupInfoA
GetFullPathNameA
FindNextFileW
FindNextFileA
FindFirstFileW
FindFirstFileA
FindClose
GetTempFileNameW
GetTempFileNameA
GetTempPathW
GetTempPathA
GetCurrentProcess
lstrcatA
SearchPathW
SearchPathA
GetCurrentDirectoryW
SetCurrentDirectoryW
SetCurrentDirectoryA
GetCurrentDirectoryA
lstrlenA
DeleteFileW
DeleteFileA
CreateDirectoryW
CreateDirectoryA
MoveFileW
RemoveDirectoryW
SetFileAttributesW
MoveFileA
RemoveDirectoryA
SetFileAttributesA
SetLastError
CreateFileW
SetFileTime
CloseHandle
GetWindowsDirectoryW
GetWindowsDirectoryA
FormatMessageW
FormatMessageA
LocalFree
GetModuleFileNameW
GetModuleFileNameA
AreFileApisANSI
LoadLibraryA
LoadLibraryExA
FreeLibrary
LeaveCriticalSection
EnterCriticalSection
GetTickCount
Sleep
DeleteCriticalSection
GetVersionExA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetLastError
GetFullPathNameW
Sections
.text Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ