Static task
static1
Behavioral task
behavioral1
Sample
d09b05b224706a8b68f73ca5ba929ed4_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d09b05b224706a8b68f73ca5ba929ed4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d09b05b224706a8b68f73ca5ba929ed4_JaffaCakes118
-
Size
214KB
-
MD5
d09b05b224706a8b68f73ca5ba929ed4
-
SHA1
b490539905d419ed3447ba400e82688c4f14474c
-
SHA256
e25c67d47ab7570e9364a0e79f09b2c7413d0b1d772c5c74fbab659c1e26f9b2
-
SHA512
2ac1508701f1d17e14ed650fad97fc1870e82e295e10a50cf98a3dc98112db6dcf1cf545eee1a27bc838866055d543da0cfd426411b8aa9d539d2a9380112128
-
SSDEEP
3072:09JkbbKdaYzs+f1mPsN2U5l2gOsDq8MlnmTfrHdwKd/DW6CqEJh2l0A:03kfIo+fwM2biqVmTD99bBEJh2t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d09b05b224706a8b68f73ca5ba929ed4_JaffaCakes118
Files
-
d09b05b224706a8b68f73ca5ba929ed4_JaffaCakes118.exe windows:4 windows x86 arch:x86
912e06a8384f5a11b5a057ed54c9cc90
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoGetMalloc
CoInitializeEx
CoLoadLibrary
CoSetProxyBlanket
CoTaskMemFree
CreateItemMoniker
OleInitialize
OleRun
RevokeDragDrop
StgCreateDocfileOnILockBytes
StringFromCLSID
comctl32
CreateStatusWindowA
CreateToolbarEx
ImageList_AddMasked
ImageList_BeginDrag
ImageList_Replace
ImageList_Write
gdi32
CloseEnhMetaFile
CombineRgn
CreateBrushIndirect
CreateDCW
CreateDIBitmap
CreateHatchBrush
DPtoLP
ExcludeClipRect
FillRgn
GdiFlush
GetCharacterPlacementA
GetDeviceCaps
GetOutlineTextMetricsA
GetROP2
GetStretchBltMode
GetTextFaceW
GetViewportExtEx
GetWindowExtEx
LPtoDP
OffsetRgn
Polygon
PolylineTo
RealizePalette
ScaleViewportExtEx
SetDIBColorTable
SetPolyFillMode
SetStretchBltMode
StartDocW
advapi32
AllocateAndInitializeSid
CheckTokenMembership
CloseServiceHandle
CryptCreateHash
CryptGenRandom
CryptReleaseContext
DeleteService
GetTokenInformation
InitializeSecurityDescriptor
LookupPrivilegeValueW
OpenProcessToken
OpenSCManagerA
OpenThreadToken
RegCreateKeyA
RegCreateKeyExW
RegEnumKeyExA
RegFlushKey
RegOpenKeyExW
RevertToSelf
SetSecurityDescriptorOwner
kernel32
ExitThread
GetCommandLineW
GetFileSize
GetFileTime
GetLocalTime
GetProcAddress
GetTempPathW
GetVersionExA
HeapSize
IsDebuggerPresent
LocalFree
LockResource
MapViewOfFile
ReadFile
ResetEvent
WaitForMultipleObjects
WriteConsoleA
lstrcmpiA
user32
CreatePopupMenu
DispatchMessageA
DrawIconEx
EnableWindow
GetMenu
GetMessageA
GetScrollRange
IsWindowVisible
RegisterClassA
RegisterWindowMessageA
ScreenToClient
shell32
DragAcceptFiles
ExtractIconW
SHBindToParent
SHBrowseForFolderW
SHFileOperationA
SHGetDesktopFolder
Shell_NotifyIconW
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ