Static task
static1
Behavioral task
behavioral1
Sample
b530b952856497f6098694623144669f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b530b952856497f6098694623144669f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b530b952856497f6098694623144669f_JaffaCakes118
-
Size
3.7MB
-
MD5
b530b952856497f6098694623144669f
-
SHA1
f0ef43cda50944404b324b66129b11c2b215aaf3
-
SHA256
3179e3899ea9889a56e8ecff976749689e823569c51f8ec993d4b05fe087ebb3
-
SHA512
5836e1a9af2db5e80bab2588d68b1dcc4e01b0dc9607f7b71ba0199277d863be86b002f5397e17e5aad1d1e2e2fe6005ab75ea57a2b0dff8943c555e5485e7fa
-
SSDEEP
98304:quG42RnADYYdbcloAqgUlVYGuoT9STED6I8sDxHYXQHOc:quLQADYw+ErfHuoTITEDZ5xH5uc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b530b952856497f6098694623144669f_JaffaCakes118
Files
-
b530b952856497f6098694623144669f_JaffaCakes118.exe windows:4 windows x86 arch:x86
78a5fe08b38b0189dbf83a02ac6fc991
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TryEnterCriticalSection
GetCommModemStatus
SetProcessAffinityMask
GetOEMCP
GetFullPathNameA
ClearCommBreak
WritePrivateProfileStringA
CreateProcessA
SetSystemTime
SetErrorMode
GetPrivateProfileSectionW
ScrollConsoleScreenBufferA
FlushFileBuffers
ExitProcess
lstrcmpA
GenerateConsoleCtrlEvent
user32
GetMenuDefaultItem
IsCharUpperW
SendNotifyMessageW
MonitorFromWindow
ExcludeUpdateRgn
WaitForInputIdle
DefWindowProcA
SetActiveWindow
CharNextA
GetWindowRgn
EnumDisplaySettingsExW
ClientToScreen
CreateDialogIndirectParamA
VkKeyScanW
SendMessageA
SetWindowTextA
SetCursorPos
GetClipboardData
SetPropA
ScreenToClient
GetParent
EnableMenuItem
LoadStringA
DestroyCaret
DefDlgProcA
GetNextDlgGroupItem
MsgWaitForMultipleObjects
GetMonitorInfoW
LoadStringW
RegisterHotKey
CharPrevW
GetWindowTextLengthW
SendDlgItemMessageA
GetClassInfoExA
SetCursor
IsRectEmpty
CharUpperW
SetForegroundWindow
GetDlgItem
RegisterDeviceNotificationW
CopyRect
DefFrameProcA
SetCapture
ExitWindowsEx
SetWindowPos
TabbedTextOutA
GetUserObjectInformationA
ToAscii
CreateIconIndirect
SetUserObjectSecurity
TrackPopupMenuEx
ToUnicodeEx
ModifyMenuW
CreateIcon
EnumChildWindows
ChildWindowFromPointEx
HideCaret
GetMessagePos
GetWindowLongW
MenuItemFromPoint
MonitorFromPoint
SetParent
gdi32
Ellipse
CreateDIBSection
RectInRegion
ExtTextOutW
CreatePatternBrush
AddFontResourceA
GetCurrentObject
OffsetClipRgn
StartDocA
GetWindowOrgEx
EnumEnhMetaFile
CreateICW
GetLayout
GetTextExtentPoint32A
FillRgn
CreateICA
EndDoc
SetGraphicsMode
GetBitmapBits
GetSystemPaletteEntries
ExtFloodFill
advapi32
DuplicateToken
CryptGenRandom
CryptReleaseContext
PrivilegeCheck
RegQueryValueExA
IsValidAcl
GetPrivateObjectSecurity
GetSecurityDescriptorOwner
RegQueryValueA
CreateServiceA
GetCurrentHwProfileW
OpenEventLogW
AddAccessAllowedAce
RegSetValueA
RegCloseKey
StartServiceCtrlDispatcherW
GetSecurityDescriptorLength
ReadEventLogW
CryptVerifySignatureW
MakeSelfRelativeSD
RegSaveKeyA
CryptSetKeyParam
GetUserNameA
InitiateSystemShutdownA
StartServiceA
LookupPrivilegeValueW
ImpersonateNamedPipeClient
RegSetValueExA
OpenSCManagerW
shell32
DragAcceptFiles
DragFinish
SHGetSettings
FindExecutableW
oleaut32
VariantCopy
QueryPathOfRegTypeLi
shlwapi
wvnsprintfW
StrFormatByteSizeA
StrCpyNW
Sections
.text Size: 13KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ