Static task
static1
Behavioral task
behavioral1
Sample
cf222551141457489d481099af44a621_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf222551141457489d481099af44a621_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cf222551141457489d481099af44a621_JaffaCakes118
-
Size
1.3MB
-
MD5
cf222551141457489d481099af44a621
-
SHA1
ed7508e50631d0cac3220a03eba45b7543c5c45d
-
SHA256
0978a3200b382fcaab47f40df52fc90ee4ee09548f6d9f7feb356bb09e527615
-
SHA512
4e656915cc6a99decc83030f04cae33bfd7c63464f47ef684d80ecbb62a76126a622259d9b687244a04928b5e1c0ee8b9396c3faeaffffa7a1d0c638508b37ca
-
SSDEEP
24576:TbiD1FLK/HDeuLoZFqTWxWJ2wqB10kTkOiOiUhi9pHd:/iJlqeuLCITWuns1rgJkiHd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf222551141457489d481099af44a621_JaffaCakes118
Files
-
cf222551141457489d481099af44a621_JaffaCakes118.exe windows:1 windows x86 arch:x86
3c4710759a9898181282d2460482c333
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
WriteFile
lstrcmpiA
FindClose
GetTempPathA
GetModuleHandleA
FileTimeToDosDateTime
GlobalFree
GetTimeFormatA
ExitProcess
ReadFile
GetStdHandle
SetCurrentDirectoryA
GetModuleFileNameA
GetLastError
CloseHandle
GlobalReAlloc
GlobalAlloc
GetDriveTypeA
GetFileAttributesA
GetFileType
GetDateFormatA
SetFileAttributesA
CreateFileA
ReadConsoleA
FileTimeToSystemTime
GetNumberFormatA
CreateProcessA
FileTimeToLocalFileTime
CreateDirectoryA
GetLocaleInfoA
DeleteFileA
GetCurrentDirectoryA
LocalFileTimeToFileTime
FlushFileBuffers
DosDateTimeToFileTime
FindFirstFileA
SetFilePointer
SetFileTime
WaitForSingleObject
WriteConsoleA
gdi32
DeleteObject
user32
MessageBoxA
LoadStringA
LoadIconA
GetDlgItemTextA
GetDlgItem
EndDialog
DispatchMessageA
DialogBoxParamA
CharUpperA
CharToOemBuffA
CharLowerA
TranslateMessage
EnableWindow
wvsprintfA
wsprintfA
WaitForInputIdle
GetMessageA
ShowWindow
SetWindowTextA
SetDlgItemTextA
OemToCharA
SendMessageA
SendDlgItemMessageA
PeekMessageA
OemToCharBuffA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
SHGetPathFromIDList
SHGetMalloc
SHGetFileInfoA
SHFileOperationA
SHBrowseForFolder
Sections
CODE Size: 12KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 1024B - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.WWP32 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE