Static task
static1
Behavioral task
behavioral1
Sample
aa633fb10bb5ab7915d9dcc616b8b9fe_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aa633fb10bb5ab7915d9dcc616b8b9fe_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aa633fb10bb5ab7915d9dcc616b8b9fe_JaffaCakes118
-
Size
330KB
-
MD5
aa633fb10bb5ab7915d9dcc616b8b9fe
-
SHA1
61e460562b8eb76d3bc9a10a8979f606ea336a3b
-
SHA256
b32b935e60482043c92c4c8e34b2d0f54b11d4661807e9ffb0c085b44635e685
-
SHA512
b90804c19197f45ad6a3e3ec17a61b35663fcbdfb34be7b87e9f5ceab49e2a58554f0378a1f75d9c4e38130eb2b3b377fc586d8da2561f68b1825aa93e291851
-
SSDEEP
6144:HRBVjnFIOXDPqPx1SPcWwP0yfBwfLtwvQwP1YHsJ2Rlw3GwTkO8:HQOzP+xSwB6fpwtPdOw3G3L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa633fb10bb5ab7915d9dcc616b8b9fe_JaffaCakes118
Files
-
aa633fb10bb5ab7915d9dcc616b8b9fe_JaffaCakes118.exe windows:4 windows x86 arch:x86
a519c0a17c2e5034d5965c23af8dc45b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
GetTickCount
GetThreadLocale
EnumResourceLanguagesA
GetSystemDefaultLangID
TlsAlloc
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
ReleaseMutex
CloseHandle
GetModuleFileNameA
GetFullPathNameA
GetProcAddress
OpenFileMappingA
WideCharToMultiByte
GetCurrentProcessId
EnterCriticalSection
GetLocaleInfoA
GetACP
GetCurrentThreadId
TlsGetValue
LeaveCriticalSection
InterlockedDecrement
FreeEnvironmentStringsA
CreateProcessA
GetEnvironmentStrings
SetEnvironmentVariableA
SetEvent
GetModuleHandleA
LoadLibraryA
GetLocaleInfoW
GetSystemDirectoryA
lstrcpynA
TerminateProcess
GetSystemTime
GetDateFormatA
lstrcmpA
GlobalFree
DisableThreadLibraryCalls
LocalFree
LocalAlloc
TlsSetValue
lstrlenW
lstrlenA
GlobalAlloc
lstrcpyA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
Sleep
InterlockedIncrement
GetLastError
MultiByteToWideChar
GetCommandLineA
VirtualProtect
VirtualFree
lstrcmpiA
VirtualAlloc
user32
SendMessageA
GetClientRect
GetDC
ReleaseDC
BeginPaint
EndPaint
ShowCursor
RegisterWindowMessageA
RegisterClassExA
CreateWindowExA
GetMonitorInfoA
EnumDisplaySettingsA
EnumDisplayDevicesA
DestroyWindow
UnregisterClassA
PostMessageA
GetUserObjectInformationA
GetThreadDesktop
DestroyIcon
FillRect
DrawTextA
GetSysColor
CallNextHookEx
GetKeyState
ActivateKeyboardLayout
GetSystemMetrics
GetFocus
GetForegroundWindow
IsIconic
CharNextA
GetKeyboardLayout
PostThreadMessageA
GetClassLongA
GetClassNameA
DrawIconEx
GetWindowThreadProcessId
PostQuitMessage
PeekMessageA
DefWindowProcA
IsWindow
CreateIconIndirect
advapi32
RegOpenKeyExA
RegQueryValueA
RegOpenKeyA
RegDeleteValueA
RegEnumKeyExA
RegSetValueExA
RegQueryValueExA
RegDeleteKeyA
RegCreateKeyExA
RegFlushKey
CryptAcquireContextA
CryptReleaseContext
CryptDestroyHash
RegCloseKey
gdi32
ExtTextOutA
CreateCompatibleBitmap
SetTextColor
PatBlt
CreateFontIndirectA
GetTextCharsetInfo
TranslateCharsetInfo
DeleteDC
CreateBitmap
SelectObject
DeleteObject
CreateCompatibleDC
GetStockObject
SetBkColor
ole32
CoTaskMemAlloc
CLSIDFromString
CoCreateInstance
msvcr71
__set_app_type
__p__commode
__setusermatherr
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
wcsncpy
memmove
strncmp
wcslen
malloc
free
_initterm
_adjust_fdiv
_except_handler3
__dllonexit
_onexit
_controlfp
__p__fmode
Sections
.text Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 249KB - Virtual size: 498KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ