Static task
static1
Behavioral task
behavioral1
Sample
b69c08130694b77072add5df2d6500ab_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b69c08130694b77072add5df2d6500ab_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b69c08130694b77072add5df2d6500ab_JaffaCakes118
-
Size
98KB
-
MD5
b69c08130694b77072add5df2d6500ab
-
SHA1
4928062dbb2a858c9c6d5eb8d9de9e0b7d07dced
-
SHA256
063f2b5548c8141abcd0ad2dc01b88ba41297a90636be0f781f83631d385d61d
-
SHA512
3ac97dbb6352461f04df3964863335f79317926e725b297847a4c6ed77dd6262c67f068f31becc052bc447f141aee489d2bb0a83e8c3303ee3df5d6d59d4cef4
-
SSDEEP
3072:wJtLwb8WgQzc/NhrwKuSpdJ/87ghCkrh9fuEu:41wb3cgKuSpn87ghTfuZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b69c08130694b77072add5df2d6500ab_JaffaCakes118
Files
-
b69c08130694b77072add5df2d6500ab_JaffaCakes118.exe windows:4 windows x86 arch:x86
a97abeb38b61ea9241aea45349d8d83f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Beep
CreateMailslotA
CreateEventW
IsValidCodePage
GetModuleHandleW
FindResourceA
OpenWaitableTimerW
lstrlenW
SetPriorityClass
GetVolumeInformationA
CreateNamedPipeA
CompareStringA
BeginUpdateResourceA
GetTempPathA
EndUpdateResourceA
GetAtomNameA
GetStartupInfoW
GetNumberFormatW
LoadResource
FindResourceW
CreateDirectoryA
FatalAppExitW
lstrcpyn
IsBadStringPtrW
GetNamedPipeInfo
ExitProcess
OpenFile
CreatePipe
DuplicateHandle
VirtualAlloc
OpenSemaphoreA
lstrcpyA
GetSystemInfo
SetCurrentDirectoryW
lstrcatA
GetCalendarInfoW
GetThreadLocale
GetProcessHeaps
CreateMutexA
GetComputerNameA
GetLogicalDrives
GetMailslotInfo
CreateMailslotW
WinExec
GetTimeFormatW
IsBadReadPtr
GetLastError
lstrcmpi
IsBadStringPtrA
OpenWaitableTimerA
user32
mouse_event
PostMessageW
DestroyCursor
IsWindowEnabled
MessageBoxIndirectW
PeekMessageW
SendDlgItemMessageA
SetParent
EnableMenuItem
GetDesktopWindow
TrackPopupMenu
GetMessageW
InsertMenuItemW
UpdateWindow
GetCapture
LoadMenuA
DefFrameProcW
SetWindowRgn
MessageBeep
DefFrameProcA
LoadIconW
RemoveMenu
GetScrollPos
SetForegroundWindow
PeekMessageA
GetMenuStringW
IsIconic
DestroyIcon
GetMenu
DialogBoxParamW
SetFocus
ClientToScreen
GetWindowTextLengthW
DefDlgProcA
IsWindow
PostMessageA
GetMenuInfo
GetDlgItemInt
SetWindowLongA
GetForegroundWindow
GetMenuItemInfoA
InsertMenuA
FillRect
TrackPopupMenuEx
GetParent
SetWindowTextA
GetMenuItemRect
gdi32
EndPath
DescribePixelFormat
ExtFloodFill
GetCharWidth32W
CreateFontIndirectW
GetViewportOrgEx
GetColorAdjustment
GetCharABCWidthsW
PolyPolygon
CreateFontA
GetFontData
advapi32
RegQueryInfoKeyW
RegReplaceKeyA
RegEnumValueW
RegOpenKeyExA
RegOpenKeyA
RegQueryValueW
shell32
SHGetFileInfoA
oleaut32
CreateTypeLib
VarDateFromUI4
VarDecRound
VarUI4FromUI2
sqlunirl
_MapVirtualKeyEx_@12
Sections
.' Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
./5:jx@ Size: 1024B - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.=pT Size: 1024B - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.q;D- Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.G#i2 Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.&W Size: 1KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.2@54? Size: 3KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.S!%5 Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 786B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ