Static task
static1
Behavioral task
behavioral1
Sample
b66a4a0ae19bfb8f9ad10b2e7497729e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b66a4a0ae19bfb8f9ad10b2e7497729e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b66a4a0ae19bfb8f9ad10b2e7497729e_JaffaCakes118
-
Size
153KB
-
MD5
b66a4a0ae19bfb8f9ad10b2e7497729e
-
SHA1
6525d16abe071e024885d410c0fbe7fa1dab50a9
-
SHA256
014cc667ac257d3001c7be9db4ffb0510ce7f8364c93ea89c379e8b288a064f8
-
SHA512
945f987df7b29eb4a518c11a2b5f18a27adcac1054a59e7fd260561790b878a0732f99b4488bdc1ad716e58eea7ccec5daa4c439617921e99ec2e4e17206f749
-
SSDEEP
1536:2DxbCVBqRAMhjMyk+Tn8uoQcacy5zXZjBXsEupJGR77mXwZuODisvyn:2DZCVBKpjiuHcacy3NsER35tRvyn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b66a4a0ae19bfb8f9ad10b2e7497729e_JaffaCakes118
Files
-
b66a4a0ae19bfb8f9ad10b2e7497729e_JaffaCakes118.exe windows:4 windows x86 arch:x86
36f6cbb702b95f97e64646e2247c4b40
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegCloseKey
RegOpenKeyA
RegSetValueExA
gdi32
GetDIBits
CreateDIBitmap
GetTextExtentPoint32A
CreateSolidBrush
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteDC
DeleteObject
GetStockObject
CreateRoundRectRgn
CreateRectRgn
CombineRgn
GetObjectA
CreateFontIndirectA
CreateDCA
kernel32
GetModuleFileNameA
CreateDirectoryA
GetLastError
CreateMutexA
CloseHandle
InitializeCriticalSection
SizeofResource
GetProcAddress
GetModuleHandleA
LoadLibraryA
GetStartupInfoA
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SystemTimeToFileTime
SetEvent
ResumeThread
GetPrivateProfileStringA
GetPrivateProfileIntA
GetEnvironmentVariableA
Sleep
WaitForSingleObject
CreateProcessA
lstrcat
lstrcpy
FormatMessageA
CreateEventA
LoadResource
ResetEvent
FindResourceA
GetDiskFreeSpaceExA
SetFileTime
mfc42
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord4424
ord3738
ord561
ord815
ord542
ord802
ord617
ord610
ord2621
ord287
ord2818
ord2915
ord858
ord535
ord537
ord5214
ord296
ord4160
ord1168
ord3663
ord3626
ord2414
ord5857
ord823
ord939
ord941
ord3584
ord543
ord803
ord3619
ord2302
ord690
ord1988
ord2393
ord5355
ord5207
ord389
ord5710
ord2763
ord1228
ord3706
ord1105
ord348
ord2243
ord1641
ord1146
ord6242
ord3092
ord765
ord2379
ord6453
ord6215
ord4486
ord1138
ord2764
ord798
ord1997
ord922
ord924
ord926
ord5465
ord5194
ord533
ord6876
ord6648
ord913
ord2765
ord4129
ord6680
ord398
ord6569
ord4202
ord5622
ord5808
ord5204
ord3229
ord6778
ord4224
ord5875
ord3089
ord4476
ord2982
ord1776
ord5290
ord3721
ord567
ord795
ord4275
ord2864
ord6197
ord6379
ord1576
ord1979
ord5186
ord354
ord755
ord470
ord3402
ord3698
ord3789
ord6010
ord3790
ord1074
ord4396
ord3574
ord4284
ord609
ord2567
ord2754
ord3220
ord3874
ord2859
ord640
ord1640
ord323
ord6283
ord6282
ord6663
ord6375
ord4274
ord4673
ord1816
ord6199
ord5802
ord2645
ord4710
ord6334
ord4234
ord2370
ord825
ord324
ord540
ord860
ord641
ord800
ord3597
ord4425
ord4627
ord4080
ord2982
ord3825
ord3825
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord1776
ord2982
ord2982
ord2982
ord5241
ord2124
ord2446
ord5261
ord1727
ord5065
ord2982
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord3825
ord6052
ord2514
ord2584
ord4853
ord4376
ord5241
ord700
ord665
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
_setmbcp
_itoa
__CxxFrameHandler
_EH_prolog
memcpy
atoi
memset
exit
_mbsicmp
strncmp
strlen
_mbscat
_mbscpy
strrchr
_beginthreadex
__dllonexit
_onexit
??1type_info@@UAE@XZ
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
setupapi
SetupIterateCabinetA
shell32
Shell_NotifyIcon
shlwapi
PathFileExistsA
user32
GetCapture
GetClientRect
PtInRect
DrawStateA
InflateRect
DrawFocusRect
DrawEdge
SetForegroundWindow
GetSysColor
FillRect
SetClassLongA
SetRect
ReleaseCapture
GetParent
SetCapture
ClientToScreen
InvalidateRect
LoadIconA
SendMessageA
GetWindowRect
SetWindowRgn
PostMessageA
DestroyCursor
LoadImageA
EnableWindow
MessageBoxA
GetIconInfo
CreateIconIndirect
LoadCursorA
SetCursor
iphlpapi
GetIfTable
Sections
.text Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ