Static task
static1
Behavioral task
behavioral1
Sample
a7d58e79e4419d34de8b1e16b75cf34c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a7d58e79e4419d34de8b1e16b75cf34c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a7d58e79e4419d34de8b1e16b75cf34c_JaffaCakes118
-
Size
381KB
-
MD5
a7d58e79e4419d34de8b1e16b75cf34c
-
SHA1
1626064f2adae95bb34371a3ce9c3ce609c0782e
-
SHA256
b04fc9c9ff8e79e037a1f08c68689bf096ff7c71e17c591a214ed84c4733bea7
-
SHA512
b2b7a5449252054eca197b775d5a8b078b58ba8494f0f2b9ca7a5e319cf3e486d429ad7b40049fcb017172eb45f38fc0c113a6f9ce128fa5a009d02d1ca86e85
-
SSDEEP
6144:HVW48L8d8YTCU6uHLBw5NKbGddq91Y5o/Hj4Ed6u/V1YmrtAOqSzMwk/f7HoC9aD:HVJLVH6UlbSYM5o/DvE+u6+OFK/f7Rgv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a7d58e79e4419d34de8b1e16b75cf34c_JaffaCakes118
Files
-
a7d58e79e4419d34de8b1e16b75cf34c_JaffaCakes118.exe windows:5 windows x86 arch:x86
e845c9b3a5e8a943b97861ba49f6e9ff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
shlwapi
PathIsDirectoryW
PathFileExistsA
PathAddBackslashW
PathFileExistsW
PathRemoveFileSpecW
PathRemoveFileSpecA
psapi
GetModuleFileNameExA
gdi32
GetStockObject
advapi32
RegDeleteValueA
RegOpenKeyExA
RegQueryInfoKeyW
RegEnumValueW
RegEnumValueA
RegQueryValueExW
RegSetValueExW
RegDeleteValueW
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegFlushKey
RegCloseKey
shell32
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
kernel32
GetSystemTimeAsFileTime
GetCurrentProcessId
GetStartupInfoA
ExitProcess
GetTickCount
CreateEventW
QueryPerformanceCounter
GlobalMemoryStatus
GetDiskFreeSpaceExW
GetLongPathNameA
Process32First
Process32Next
OpenProcess
OpenThread
SuspendThread
ResumeThread
lstrcpyA
CreateToolhelp32Snapshot
Thread32First
Thread32Next
DeleteFileW
GetModuleFileNameW
CreateDirectoryW
SetFileAttributesW
CreateDirectoryA
SetFileAttributesA
OutputDebugStringW
OutputDebugStringA
GetModuleFileNameA
SetCurrentDirectoryA
GetCommandLineA
GetModuleHandleW
GetTempPathW
GetPriorityClass
ResetEvent
SetEvent
LeaveCriticalSection
EnterCriticalSection
WaitForSingleObject
TerminateThread
CloseHandle
CreateThread
SetThreadPriority
Sleep
GetCurrentProcess
SetPriorityClass
SetErrorMode
GetCurrentThreadId
lstrlenA
lstrcmpiA
DeleteCriticalSection
InitializeCriticalSection
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
odbc32
SQLFreeConnect
user32
FindWindowW
SendMessageA
PostMessageA
EnableWindow
PeekMessageA
GetDesktopWindow
RegisterClassA
GetWindowTextA
GetWindowThreadProcessId
IsIconic
GetMessageA
EnumThreadWindows
wvsprintfW
DispatchMessageA
TranslateMessage
LoadIconA
LoadCursorA
RegisterClassExA
FindWindowA
CreateWindowExA
ShowWindow
UpdateWindow
BeginPaint
EndPaint
PostQuitMessage
DestroyWindow
DefWindowProcA
UnregisterClassA
IsWindowVisible
Sections
.text Size: 268KB - Virtual size: 267KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.init Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 103KB - Virtual size: 436KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ