Static task
static1
Behavioral task
behavioral1
Sample
b68a2dcec2a42309ebdcb04fa07cf31b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b68a2dcec2a42309ebdcb04fa07cf31b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b68a2dcec2a42309ebdcb04fa07cf31b_JaffaCakes118
-
Size
97KB
-
MD5
b68a2dcec2a42309ebdcb04fa07cf31b
-
SHA1
ae7cda11fabe3a59b475c7a0ca2000aa5486b0f3
-
SHA256
8dd9008172c0fa1bb1f865cc769e9dc52a32e979d12db9db729ae30457b77ad2
-
SHA512
7891577686fd9a1eb91c86ae05ec5204864812be37ed0662e3b9b85f72f335f0219d3bafe8a9bcac97300293335e6eb128852dab8a0f79ebb55d2f259f2df5d9
-
SSDEEP
1536:z9w1d3EDgIi4WLbnmqkN72G5qlAAhK/i/pBQTX21qZcIUo:hwd3EgT4WLbmx7Sldh2McQ6cro
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b68a2dcec2a42309ebdcb04fa07cf31b_JaffaCakes118
Files
-
b68a2dcec2a42309ebdcb04fa07cf31b_JaffaCakes118.exe windows:4 windows x86 arch:x86
5c9ecba8cba476acb6bde34174ed3759
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
GetLogicalDrives
GetModuleFileNameA
MulDiv
GlobalFree
GlobalAlloc
OpenProcess
FreeLibrary
GetProcAddress
LoadLibraryA
GetVersionExA
TerminateProcess
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
WriteFile
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
WinExec
HeapDestroy
CreateFileA
GetFileType
GetStdHandle
SetHandleCount
SetFilePointer
ReadFile
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
HeapSize
GetOEMCP
GetACP
GetCPInfo
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindNextFileA
FindFirstFileA
GetLastError
HeapAlloc
HeapReAlloc
HeapFree
GetCurrentProcess
ExitProcess
GetLocalTime
GetSystemTime
GetTimeZoneInformation
GetFileAttributesA
RtlUnwind
DeleteFileA
Sleep
GetLogicalDriveStringsA
GetVolumeInformationA
SetErrorMode
CloseHandle
DeviceIoControl
Beep
CopyFileA
GetSystemDirectoryA
GetEnvironmentVariableA
GetWindowsDirectoryA
HeapCreate
GetVersion
user32
GetDlgItemInt
GetDlgItemTextA
GetWindowTextLengthA
GetDlgItem
RegisterWindowMessageA
RegisterClassExA
EndDialog
DialogBoxParamA
BeginPaint
GetClientRect
FillRect
MoveWindow
DrawTextA
EndPaint
PostQuitMessage
GetSystemMetrics
LoadCursorA
UpdateWindow
SendMessageA
MessageBoxA
SetWindowPos
ShowWindow
wsprintfA
SetDlgItemTextA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
SetActiveWindow
FindWindowA
DefWindowProcA
GetCursorPos
SetForegroundWindow
TrackPopupMenu
PostMessageA
GetMenuItemID
LoadMenuA
GetSubMenu
DestroyMenu
SetMenuDefaultItem
LoadStringA
KillTimer
SetTimer
LoadIconA
DestroyWindow
CreateWindowExA
SendDlgItemMessageA
gdi32
CreateFontA
CreateSolidBrush
SetBkMode
SelectObject
SetTextColor
GetDeviceCaps
advapi32
RegDeleteValueA
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
shell32
Shell_NotifyIconA
winmm
mciSendCommandA
Sections
.text Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE