Static task
static1
Behavioral task
behavioral1
Sample
ba00ecc6643215e2a164c5b485ca4371_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ba00ecc6643215e2a164c5b485ca4371_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ba00ecc6643215e2a164c5b485ca4371_JaffaCakes118
-
Size
1024KB
-
MD5
ba00ecc6643215e2a164c5b485ca4371
-
SHA1
8e1add65db1dd11f5a767d64fb28e8b8c3c0c949
-
SHA256
7f105f4464a5af0b776dc751b7e0c2fd7797b14e85bc0ad1f3654ae83ac82071
-
SHA512
43609d5538d3547f01cc4e3ae56bcea2f0f20f2ddb85dcbfc37c103a83ed1d08bbd04539c386b65c09a135abba031aa5f963279eab5106cad2b353346cac5925
-
SSDEEP
12288:ehwQL2TdPz2I1PDOTdJYlIz0sa27bN/bp3fC7+i2aaazaLmLL3CjGAmaIaaaza0:YwNTdaI1eHYmeqN3haaazak/aaaza0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ba00ecc6643215e2a164c5b485ca4371_JaffaCakes118
Files
-
ba00ecc6643215e2a164c5b485ca4371_JaffaCakes118.exe windows:4 windows x86 arch:x86
58144076e6d9f33d1991776915ea0749
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
strncpy
strlen
sprintf
strcmp
strncmp
fclose
fabs
ceil
malloc
floor
free
strcat
memcpy
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
FindResourceA
LoadResource
LockResource
SizeofResource
LoadLibraryA
GetProcAddress
FreeLibrary
GetCurrentProcessId
GetCurrentThreadId
GetVersionExA
HeapAlloc
HeapFree
InitializeCriticalSection
SetLastError
TlsAlloc
GetTempPathA
GetDriveTypeA
FindFirstFileA
FindClose
GetFileAttributesA
CreateDirectoryA
DeleteFileA
WriteFile
CloseHandle
CreateFileA
ReadFile
SetFilePointer
HeapReAlloc
comctl32
InitCommonControls
InitCommonControlsEx
user32
SendMessageA
MessageBoxA
GetForegroundWindow
GetWindowThreadProcessId
IsWindowVisible
IsWindowEnabled
EnableWindow
EnumWindows
DestroyWindow
CreateWindowExA
SetWindowTextA
GetWindowLongA
CallWindowProcA
RemovePropA
SetWindowLongA
DefWindowProcA
SetPropA
GetParent
GetPropA
GetWindow
SetActiveWindow
UnregisterClassA
DestroyAcceleratorTable
LoadIconA
LoadCursorA
RegisterClassA
AdjustWindowRectEx
GetSystemMetrics
GetActiveWindow
GetWindowRect
ShowWindow
CreateAcceleratorTableA
PeekMessageA
MsgWaitForMultipleObjects
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
SetCursorPos
LoadImageA
SetCursor
MapWindowPoints
MoveWindow
SystemParametersInfoA
GetKeyState
SetCapture
PostMessageA
GetCursorPos
ReleaseCapture
SetFocus
GetFocus
GetClientRect
FillRect
EnumChildWindows
DefFrameProcA
IsChild
GetClassNameA
DestroyIcon
gdi32
GetStockObject
DeleteObject
GetObjectType
GetObjectA
CreateCompatibleDC
GetDIBits
DeleteDC
CreateDIBSection
SelectObject
BitBlt
CreateBitmap
SetPixel
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
ole32
CoInitialize
CoTaskMemFree
RevokeDragDrop
Sections
.code Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 458B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 999KB - Virtual size: 998KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ