Static task
static1
Behavioral task
behavioral1
Sample
bd863a8d4ee552a2d36963f66bfeafef_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bd863a8d4ee552a2d36963f66bfeafef_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bd863a8d4ee552a2d36963f66bfeafef_JaffaCakes118
-
Size
501KB
-
MD5
bd863a8d4ee552a2d36963f66bfeafef
-
SHA1
1e4a973486895a87ad4a16b17d5c12a4d1baa69b
-
SHA256
bc58ea3941b48fdc7865bae4ec8e501226dd940c1062b13fee60c034e8c3cd38
-
SHA512
b3afe1263bae3221cfa591ed42ee153109ea066c73ca561fb8a4a18341622e097a050cef1a36bd2fe6a0dd7c137c8058886636605e4567325f391aa47d2577c8
-
SSDEEP
12288:uB854K/EWHQj8UC+cCPIfs++kJIditun3c+X7d5gHWAIeq:uB8T/EWHQgUC+liWkJ2i03bHeq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd863a8d4ee552a2d36963f66bfeafef_JaffaCakes118
Files
-
bd863a8d4ee552a2d36963f66bfeafef_JaffaCakes118.exe windows:5 windows x86 arch:x86
1748ac06aad9bfcf6f949b349ef34cfd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrStrA
StrStrIA
StrChrA
kernel32
lstrcmpA
AllocConsole
GetStdHandle
WriteFile
WriteConsoleA
ReadFile
ReadConsoleA
MultiByteToWideChar
HeapFree
lstrcmpiA
WideCharToMultiByte
HeapAlloc
SetConsoleMode
GetConsoleMode
GetLastError
GetModuleFileNameA
ExitProcess
Sleep
CreateThread
GetTimeFormatA
CloseHandle
CreateFileA
SizeofResource
LockResource
LoadResource
FindResourceA
lstrlenA
GetFileAttributesA
GetSystemDefaultLCID
GetModuleHandleA
ReadConsoleInputA
lstrcatA
WaitForSingleObject
SetConsoleCursorPosition
FillConsoleOutputCharacterA
GetConsoleScreenBufferInfo
PeekNamedPipe
lstrlenW
CreateProcessA
DuplicateHandle
GetCurrentProcess
CreatePipe
GetVersion
GetExitCodeProcess
TerminateProcess
GetTickCount
SetCurrentDirectoryA
DeleteFileA
ExpandEnvironmentStringsA
GetCurrentDirectoryA
lstrcpyA
lstrcmpW
GetCommandLineA
GetProcessHeap
RemoveDirectoryA
lstrcatW
CreateDirectoryA
GetTempPathA
user32
GetDesktopWindow
CharLowerA
IsCharAlphaNumericA
GetParent
DialogBoxParamA
CharToOemA
MessageBoxA
GetForegroundWindow
GetWindowRect
CopyRect
OffsetRect
SetWindowPos
LoadStringA
SetDlgItemTextA
GetDlgItem
SetFocus
GetDlgItemTextA
EndDialog
wsprintfA
advapi32
RegQueryValueExA
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExW
ole32
CoUninitialize
CoGetObject
CLSIDFromProgID
CoCreateInstance
CoInitialize
oleaut32
VariantTimeToSystemTime
VarBstrFromCy
VarBstrFromR4
VarBstrFromR8
VarBstrFromDec
SafeArrayUnaccessData
LoadTypeLi
SysFreeString
VariantInit
SysAllocString
DispInvoke
DispGetIDsOfNames
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SysStringLen
SafeArrayAccessData
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 432KB - Virtual size: 431KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ