Static task
static1
Behavioral task
behavioral1
Sample
b20afdfde7f8e6bd7c205acc9d672cbe_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b20afdfde7f8e6bd7c205acc9d672cbe_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b20afdfde7f8e6bd7c205acc9d672cbe_JaffaCakes118
-
Size
187KB
-
MD5
b20afdfde7f8e6bd7c205acc9d672cbe
-
SHA1
33e93839462bf335c4351e5cc56025e8b39c60f6
-
SHA256
2ee2c5ac663877e3ef8187500ef111018dd988d0b78785b8eab2cbacd6ec2ef9
-
SHA512
aff579d310f92ca5974bd1dad6d53765cc8db547a45e103b37aa0c7ffa79306309a2ae1fdaf7b66fc5a5d464ce0448436c3aecf257a6ee2e685427407fb24432
-
SSDEEP
3072:GNxSJR1vaWawMUQtcT39r1HKJO2AaWt/yU9XWWae90V7vk/1kpuHCcHl8z:GNxSTVMKBJKJO4WlRvjO7mKpuHNKz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b20afdfde7f8e6bd7c205acc9d672cbe_JaffaCakes118
Files
-
b20afdfde7f8e6bd7c205acc9d672cbe_JaffaCakes118.exe windows:4 windows x86 arch:x86
7ba723b64d17f7a384fbe9ed1b0583ff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
FindExecutableA
SHBrowseForFolderA
SHGetMalloc
user32
GetClientRect
SetRect
EndPaint
LoadCursorA
GetLastActivePopup
ShowWindow
PostMessageA
SendMessageA
EnableWindow
GetWindowLongA
SetWindowLongA
SetWindowTextA
SetForegroundWindow
SetActiveWindow
SetDlgItemTextA
GetKeyState
CharUpperBuffA
GetParent
SendDlgItemMessageA
GetSysColor
InvalidateRect
UpdateWindow
LoadStringA
MessageBoxA
SetTimer
KillTimer
DialogBoxParamA
GetDlgItemTextA
EndDialog
GetWindowRect
GetSystemMetrics
SetWindowPos
PeekMessageA
TranslateMessage
DispatchMessageA
SetCursor
CharNextA
BeginPaint
SetWindowWord
GetWindowWord
DefWindowProcA
RegisterClassA
GetDlgItem
kernel32
GetLocaleInfoA
Sleep
EnterCriticalSection
LeaveCriticalSection
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
GetLastError
GetVersionExA
FindClose
FindFirstFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
LoadLibraryA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
LocalAlloc
GetDriveTypeA
GetEnvironmentVariableA
SetFilePointer
CloseHandle
CreateFileA
GetWindowsDirectoryA
_lclose
GlobalFree
GlobalUnlock
GlobalHandle
_llseek
_lread
_lopen
GlobalLock
GlobalAlloc
GlobalMemoryStatus
GetVersion
GetModuleFileNameA
WriteFile
GetSystemTime
lstrlenA
LocalFree
ExitProcess
GetModuleHandleA
_lcreat
GetVolumeInformationA
WinExec
lstrcmpiA
SetErrorMode
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
GetConsoleCP
GetConsoleMode
HeapSize
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
FlushFileBuffers
WriteConsoleW
CreateDirectoryA
_lwrite
RtlUnwind
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
gdi32
SetTextColor
SetTextAlign
GetBkColor
GetTextExtentPoint32A
ExtTextOutA
CreateDCA
GetDeviceCaps
CreateFontIndirectA
DeleteDC
SelectObject
DeleteObject
SetBkColor
advapi32
RegQueryValueA
comctl32
ord17
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_winzip_ Size: 3.3MB - Virtual size: 3.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ