Static task
static1
Behavioral task
behavioral1
Sample
aac4b28b8f7418f82a2e387b38504159_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
aac4b28b8f7418f82a2e387b38504159_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aac4b28b8f7418f82a2e387b38504159_JaffaCakes118
-
Size
539KB
-
MD5
aac4b28b8f7418f82a2e387b38504159
-
SHA1
3b3ae6d15536be5b2e429afc8e37d60fdae2d16a
-
SHA256
adf68dfb617481d588a42364e4e1c9bc086c7c5505696b2b680ba78e425830a1
-
SHA512
93fa23dbcd5dcab31949a561e9851b267efacb33af3392f6014ef310288d4e81ca4e1ddab65c6147f02634163b2326f4f7a03d6a3cc76ad13ab8b5e016308d6d
-
SSDEEP
12288:iKJkfUAjKpIadRPYc6tNrLt4uAgYBk8yBjSaSaYzOdD:dJkfUAjKyCRgc6jvt4uAgIyZS/jzC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aac4b28b8f7418f82a2e387b38504159_JaffaCakes118
Files
-
aac4b28b8f7418f82a2e387b38504159_JaffaCakes118.exe windows:4 windows x86 arch:x86
30d55b01c853b75904542120c7bfdb52
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileStringA
FindClose
GetDiskFreeSpaceA
GetWindowsDirectoryA
FindFirstFileA
GetDriveTypeA
FindNextFileA
LoadLibraryA
GetModuleFileNameA
GetTickCount
GetLastError
SetFileAttributesA
GetFileAttributesA
OutputDebugStringA
MoveFileExA
GetModuleHandleA
InterlockedDecrement
GetProcAddress
FreeLibrary
InterlockedIncrement
DeleteFileA
GetFileType
CreateDirectoryA
RaiseException
RemoveDirectoryA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetTimeZoneInformation
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
IsBadWritePtr
VirtualAlloc
SetFilePointer
SetEndOfFile
SetStdHandle
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
CreateFileA
WriteFile
CloseHandle
FreeResource
FindResourceA
LoadResource
SizeofResource
LockResource
LocalAlloc
LocalLock
HeapReAlloc
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
LocalUnlock
LocalFree
IsBadReadPtr
SetUnhandledExceptionFilter
SetEnvironmentVariableW
IsBadCodePtr
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
EnterCriticalSection
LeaveCriticalSection
MoveFileA
GetCPInfo
GetACP
GetOEMCP
ReadFile
GetEnvironmentStringsW
HeapAlloc
TerminateProcess
VirtualFree
RtlUnwind
HeapSize
HeapFree
InitializeCriticalSection
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
SetLastError
SetHandleCount
GetStdHandle
DeleteCriticalSection
TlsSetValue
TlsAlloc
TlsGetValue
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
user32
CreateWindowExA
DispatchMessageA
TranslateMessage
GetMessageA
PostThreadMessageA
CharUpperA
CharPrevA
CharNextA
GetSystemMetrics
LoadIconA
SendMessageA
SendDlgItemMessageA
InvalidateRect
UpdateWindow
EndDialog
SystemParametersInfoA
GetParent
GetWindowRect
SetWindowPos
CreateDialogIndirectParamA
IsWindow
GetSysColor
FindWindowA
SetWindowTextA
LoadStringA
MessageBoxA
PeekMessageA
IsDialogMessageA
PostQuitMessage
DestroyWindow
RegisterClassA
DefWindowProcA
advapi32
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
RegCreateKeyExA
gdi32
CreateSolidBrush
DeleteObject
SetBkColor
SetTextColor
comctl32
ord17
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
Sections
.text Size: 120KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.0MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ