Static task
static1
Behavioral task
behavioral1
Sample
ae5ab1c8d398eee28a41740dd8f72c36_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ae5ab1c8d398eee28a41740dd8f72c36_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ae5ab1c8d398eee28a41740dd8f72c36_JaffaCakes118
-
Size
121KB
-
MD5
ae5ab1c8d398eee28a41740dd8f72c36
-
SHA1
b3b55e4c8b6b260d7dd01291cb9b021a46d44fa8
-
SHA256
f26b3d15cfeaf3129c0dfa2096dd4feec87a59c933612688569ba8693be1d936
-
SHA512
a00de4e742030209f30e5dbfe985d3d58a801be0c77f93fb639d6d6d12010bca9dd84233cf0951e439d6240150d0d39e5201d3f75ef187ff07ae6dc6bd70a8ed
-
SSDEEP
1536:HG/CUILTJ34yv0ZvsBTchbwhX9yGQKI/meNPPPkq4SqinToIfMIO085U:mqUktLv0ZrhbWty3PPPknuTBfCp5U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae5ab1c8d398eee28a41740dd8f72c36_JaffaCakes118
Files
-
ae5ab1c8d398eee28a41740dd8f72c36_JaffaCakes118.exe windows:4 windows x86 arch:x86
31badb5f9e137933eff8b919cc64e59c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrDupW
PathAppendW
StrToIntW
PathIsDirectoryEmptyW
PathCombineW
StrCSpnW
StrRChrW
PathCompactPathW
PathRemoveBlanksW
PathStripPathW
PathRenameExtensionW
PathStripToRootW
PathFindFileNameW
PathUnquoteSpacesW
kernel32
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetProcAddress
GetExitCodeThread
SetThreadPriority
SetEvent
WaitForSingleObject
CloseHandle
CreateEventW
CreateThread
ResetEvent
ResumeThread
GetCommandLineW
lstrcpyW
lstrlenW
lstrcatW
FindResourceExW
SizeofResource
LoadResource
LockResource
MultiByteToWideChar
FlushFileBuffers
GetLastError
GetUserDefaultUILanguage
HeapFree
GetProcessHeap
CreateFileW
lstrcpynW
lstrcmpiW
DeleteFileW
GetModuleFileNameW
HeapAlloc
WriteFile
LocalFree
GetExitCodeProcess
GetFileAttributesW
GetFileTime
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
ExpandEnvironmentStringsW
GetTempPathW
GetLongPathNameW
GetDiskFreeSpaceExW
GetTickCount
InterlockedIncrement
LocalAlloc
ReadFile
SetFilePointer
LCMapStringW
WideCharToMultiByte
LCMapStringA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
RtlUnwind
InitializeCriticalSection
LoadLibraryA
VirtualAlloc
HeapReAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
VirtualFree
HeapCreate
GetModuleHandleA
HeapDestroy
DeleteCriticalSection
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetLastError
GetCurrentThreadId
InterlockedDecrement
Sleep
HeapSize
ExitProcess
GetStdHandle
lstrcmpW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
GetVersionExA
FreeEnvironmentStringsA
GetEnvironmentStrings
GetModuleFileNameA
user32
SetWindowPos
PostMessageW
EnableWindow
GetWindowLongW
SendDlgItemMessageW
FillRect
DrawTextW
GetSysColor
ReleaseDC
CallWindowProcW
SetWindowLongW
IsWindowVisible
InvalidateRect
SetFocus
GetParent
GetDlgItemTextW
GetDlgItem
GetClientRect
CreateDialogParamW
DestroyWindow
PostQuitMessage
MessageBoxW
GetDC
LoadIconW
KillTimer
SetTimer
wsprintfW
InsertMenuItemW
GetSystemMenu
IsWindow
EndDialog
SetDlgItemTextW
SetWindowTextW
GetMessageW
UpdateWindow
ShowWindow
CreateDialogIndirectParamW
DialogBoxIndirectParamW
SendMessageW
DispatchMessageW
TranslateMessage
IsDialogMessageW
PeekMessageW
gdi32
SelectClipRgn
CreateRectRgnIndirect
SelectObject
SetBkMode
GetStockObject
DeleteObject
CreateFontIndirectW
GetObjectW
SetTextColor
shell32
SHGetFolderPathW
SHCreateDirectoryExW
SHFileOperationW
ShellExecuteExW
SHGetPathFromIDListW
SHBrowseForFolderW
CommandLineToArgvW
ole32
CoTaskMemFree
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ