Static task
static1
Behavioral task
behavioral1
Sample
b6739724fc923d9ffec030225bdd4102_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b6739724fc923d9ffec030225bdd4102_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b6739724fc923d9ffec030225bdd4102_JaffaCakes118
-
Size
251KB
-
MD5
b6739724fc923d9ffec030225bdd4102
-
SHA1
1c18301477a2d5c418df0f88995e3265bf9b22bf
-
SHA256
9587137e767d42e0231bbfc8697ef05a0cf48fdb90d76ab9b39f5fbe4439c48b
-
SHA512
3f998fe8061586fca1c0d7ecc76c6c1e1a036b5f7abe1a9311051c8ecb879941cdd2702470dcf398f02a77280e164ed71cf9180d51c979c53c244d0d537f24e9
-
SSDEEP
6144:vU26tykuhw0qmN22xsrBf3rYQyweYXVX3RKL:2+GUxeBfstweYlHRKL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b6739724fc923d9ffec030225bdd4102_JaffaCakes118
Files
-
b6739724fc923d9ffec030225bdd4102_JaffaCakes118.exe windows:4 windows x86 arch:x86
f3d82dbcbac0ac8901aa101ed8b192fb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
FreeLibrary
GetTimeFormatW
WaitForSingleObject
SystemTimeToFileTime
GetDateFormatW
lstrcpynW
GetModuleHandleW
lstrlenW
lstrlenA
SetErrorMode
CreateDirectoryW
GetSystemDirectoryW
FileTimeToSystemTime
GetWindowsDirectoryW
LocalFree
GetTempPathW
LocalAlloc
RemoveDirectoryW
OpenEventW
SetUnhandledExceptionFilter
IsDebuggerPresent
ExpandEnvironmentStringsA
CreateEventW
lstrcmpW
CompareFileTime
lstrcmpiW
FindResourceW
LoadResource
GetCurrentThreadId
BeginUpdateResourceW
GetProcAddress
user32
GetFocus
EnableMenuItem
DestroyIcon
LoadCursorW
GetSysColor
GetSubMenu
RemoveMenu
GetSysColorBrush
CreatePopupMenu
CreateMenu
GetMenuItemID
GetMenuState
GetMenuItemCount
AppendMenuW
LoadBitmapW
SetWindowPos
GetDesktopWindow
CopyRect
GetMenuItemInfoW
FindWindowW
EnableWindow
SendMessageW
GetSystemMetrics
IsWindow
SetTimer
InvalidateRect
GetCursorPos
RegisterWindowMessageW
GetForegroundWindow
gdi32
CreateCompatibleDC
CreateFontIndirectW
CreatePen
CreateDIBSection
CreateHatchBrush
CreateRectRgn
DeleteObject
CreatePatternBrush
CreateSolidBrush
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
wininet
HttpQueryInfoW
InternetCloseHandle
HttpSendRequestExW
InternetWriteFile
HttpEndRequestW
HttpOpenRequestW
HttpAddRequestHeadersW
HttpSendRequestW
InternetOpenW
InternetConnectW
InternetAttemptConnect
InternetReadFile
shell32
ShellExecuteW
comctl32
ImageList_GetIconSize
quartz
AMGetErrorTextA
AmpFactorToDB
DllGetClassObject
DBToAmpFactor
DllCanUnloadNow
DllUnregisterServer
kbdro
KbdLayerDescriptor
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ERcnwN Size: 512B - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.x Size: 4KB - Virtual size: 427KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sO Size: 512B - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.A Size: 1KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.GsBwN Size: 512B - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ay Size: 81KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 282KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.N Size: 131KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Nll Size: 3KB - Virtual size: 373KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ