Static task
static1
Behavioral task
behavioral1
Sample
aeb186dd3d1022b5b511cbc308e9c853_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
aeb186dd3d1022b5b511cbc308e9c853_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aeb186dd3d1022b5b511cbc308e9c853_JaffaCakes118
-
Size
115KB
-
MD5
aeb186dd3d1022b5b511cbc308e9c853
-
SHA1
c161cdc1d22ff7d1530951a71cd6a823d5f436d2
-
SHA256
fea8c2ba1de2408ea8dec0802585f9c80368f56bf808f85732179b5e736cd14c
-
SHA512
46693c234e832966280a04cbc6124564ae1b24574df44477f6fd33b1258947f216a0195b111530f9be50d440702610c7a86498afad60a07828b870230768e8f1
-
SSDEEP
3072:MGyR1NJJuOKlMB7JO5Y+YHoRmAXJG8t+TrL8KE68:MG+1NJJ/Kly7MKGXJG8tgcn68
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aeb186dd3d1022b5b511cbc308e9c853_JaffaCakes118
Files
-
aeb186dd3d1022b5b511cbc308e9c853_JaffaCakes118.exe windows:5 windows x86 arch:x86
142bf284db602b28b84d956cf9ad43bd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowLongA
GetDlgItemTextA
DialogBoxIndirectParamA
ShowWindow
ExitWindowsEx
GetDesktopWindow
CharPrevA
GetWindowRect
SetWindowLongA
wsprintfA
CallWindowProcA
EndDialog
DispatchMessageA
MsgWaitForMultipleObjects
EnableWindow
SendMessageA
CharNextA
SendDlgItemMessageA
PeekMessageA
MessageBoxA
LoadStringA
SetForegroundWindow
GetDC
SetWindowTextA
SetWindowPos
GetDlgItem
SetDlgItemTextA
CharUpperA
ReleaseDC
MessageBeep
kernel32
MultiByteToWideChar
CreateFileW
WriteFile
FindResourceW
CreateFileA
LocalFree
GetFileSize
LoadResource
SizeofResource
GetSystemDefaultLangID
GetUserDefaultLangID
VirtualAlloc
HeapFree
GetProcessHeap
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
GetFileAttributesW
FindFirstFileW
GetTickCount
GetLastError
GetWindowsDirectoryA
lstrcmpiA
GetCurrentThreadId
SetFilePointer
FindClose
CreateDirectoryW
lstrlenA
InterlockedIncrement
GetPrivateProfileStringW
ReadFile
DeleteFileW
VirtualFree
QueryPerformanceCounter
GetPrivateProfileIntW
ReleaseSemaphore
CreateMutexA
UnhandledExceptionFilter
OpenSemaphoreA
IsBadReadPtr
SetFileAttributesA
VirtualQuery
LockResource
GetVersionExA
CreateSemaphoreA
GetCurrentProcessId
GetTempPathW
GetTempFileNameW
GetProcessVersion
VirtualLock
HeapAlloc
InterlockedDecrement
GetSystemDirectoryW
CloseHandle
SetLastError
FindNextFileW
RemoveDirectoryW
VirtualUnlock
SetEndOfFile
GetCurrentProcess
GetStartupInfoA
ReleaseMutex
IsSystemResumeAutomatic
GetSystemTime
SetDllDirectoryA
DeviceIoControl
ntdll
RtlGetDaclSecurityDescriptor
RtlInitUnicodeString
RtlInitAnsiString
RtlEqualUnicodeString
NtQuerySecurityObject
RtlSetDaclSecurityDescriptor
RtlCreateSecurityDescriptor
NtSetSecurityObject
NtQueryObject
advapi32
CryptGetHashParam
RegOpenKeyExA
RegQueryValueExA
CryptHashData
RegCloseKey
CryptCreateHash
CryptAcquireContextA
CryptDestroyHash
gdi32
CreateFontIndirectA
GetObjectA
GetStockObject
DeleteObject
ole32
CoGetInterfaceAndReleaseStream
CoCreateInstance
OleInitialize
CoMarshalInterThreadInterfaceInStream
CLSIDFromProgID
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yudf Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 129KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ