Static task
static1
Behavioral task
behavioral1
Sample
af5daaf303f21b5624c92b216f43653b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
af5daaf303f21b5624c92b216f43653b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
af5daaf303f21b5624c92b216f43653b_JaffaCakes118
-
Size
80KB
-
MD5
af5daaf303f21b5624c92b216f43653b
-
SHA1
246bc67c0a201c7cdebbf5ff0d1b95a094dddef0
-
SHA256
97bff907d5634d634d199e96c4cd4a38668ddb4a500627a852aeeacb8391d4a4
-
SHA512
0be051b0affc03a297d18a9750a8e6b7e45bb9674e18104d7d4d3ee4fd4bea3e40b8e0ee97c6cf941f1cf3cfdad8ff22d1b7eca30f2737cc7362e820737b3253
-
SSDEEP
1536:fC4pSUjbUSwhbj2rC+Wgmoyeg6aFs8uxpJFtcsncEqQx:9DjbWhz+bmovKFsFpJFtcsnc3Qx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource af5daaf303f21b5624c92b216f43653b_JaffaCakes118
Files
-
af5daaf303f21b5624c92b216f43653b_JaffaCakes118.exe windows:4 windows x86 arch:x86
ea4fd8b8eb59f304d3e2900a11159847
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
GetModuleFileNameA
FindFirstFileA
GetPrivateProfileStringA
GetCurrentProcess
GetDriveTypeA
GetVersionExA
WritePrivateProfileStringA
MoveFileExA
GetShortPathNameA
SetFileTime
GetTempPathA
GetFullPathNameA
GetWindowsDirectoryA
GetSystemDirectoryA
lstrlenA
GlobalHandle
lstrcatA
GetDiskFreeSpaceA
CloseHandle
GlobalAlloc
GlobalLock
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
SetUnhandledExceptionFilter
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
MoveFileA
SetFileAttributesA
DeleteFileA
GetFileAttributesA
GetLastError
TerminateProcess
GlobalUnlock
SetCurrentDirectoryA
GetCurrentDirectoryA
RaiseException
WinExec
GlobalFree
CreateDirectoryA
HeapFree
SetEnvironmentVariableA
HeapCompact
HeapSize
HeapAlloc
CreateFileA
ReadFile
RtlUnwind
IsBadCodePtr
GetStringTypeA
IsBadReadPtr
LoadLibraryA
LocalAlloc
LocalFree
ExitProcess
WriteFile
GetProcAddress
SetFilePointer
GetStringTypeW
user32
GetWindow
DestroyWindow
GetSysColor
GetDC
GetWindowRect
SendMessageA
ScreenToClient
FillRect
GetDlgItem
EndPaint
SetWindowLongA
BeginPaint
GetClientRect
wsprintfA
ReleaseDC
SetDlgItemTextA
GetParent
SetWindowPos
GetSystemMetrics
SetWindowTextA
PostMessageA
GetDlgItemTextA
OemToCharA
CreateWindowExA
LoadIconA
LoadCursorA
RegisterClassA
FindWindowA
GetLastActivePopup
BringWindowToTop
AdjustWindowRectEx
UpdateWindow
ExitWindowsEx
IsIconic
RedrawWindow
PostQuitMessage
DefWindowProcA
ShowWindow
KillTimer
SetTimer
SetFocus
DialogBoxIndirectParamA
EndDialog
EnableWindow
MessageBoxA
CreateDialogIndirectParamA
IsDialogMessageA
GetMessageA
TranslateMessage
DispatchMessageA
RegisterWindowMessageA
gdi32
GetObjectA
StretchDIBits
GetStockObject
CreateCompatibleDC
DeleteObject
CreateFontIndirectA
CreateSolidBrush
SetBkColor
CreatePalette
ExtTextOutA
GetDeviceCaps
RealizePalette
GetSystemPaletteEntries
IntersectClipRect
TextOutA
SelectPalette
SetBkMode
SelectObject
SetTextColor
DeleteDC
BitBlt
CreateCompatibleBitmap
CreateDIBPatternBrush
comdlg32
GetSaveFileNameA
advapi32
RegOpenKeyA
OpenProcessToken
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueA
shell32
ShellExecuteA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
VerFindFileA
comctl32
ord17
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ