Static task
static1
Behavioral task
behavioral1
Sample
d0c135a83582c091d73a3ae0fdd807b3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0c135a83582c091d73a3ae0fdd807b3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d0c135a83582c091d73a3ae0fdd807b3_JaffaCakes118
-
Size
296KB
-
MD5
d0c135a83582c091d73a3ae0fdd807b3
-
SHA1
28ae05815368bb28534e076582e46c0a89e3e92f
-
SHA256
3d5d42b90af2819709bf38b69c6b30d536253d18987f72750695eee3a5f48668
-
SHA512
891d692e1748e0281d516dfc687dda8088b523c83fdfcb193a5842c336a808c963ec3a170559ebe07e5b9f471b9f6aeceb3fa56a70f429a668e817fae5260a17
-
SSDEEP
6144:osEKIQjehe5yr1oty9LJknBXTWEMgBPsisIBSsKN:osEVOM179VVgtTsISs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d0c135a83582c091d73a3ae0fdd807b3_JaffaCakes118
Files
-
d0c135a83582c091d73a3ae0fdd807b3_JaffaCakes118.exe windows:4 windows x86 arch:x86
4957cbcd8c39511fec39769d161ebf71
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryA
CreateDirectoryW
GetBinaryTypeA
SuspendThread
SetConsoleWindowInfo
WriteFile
WritePrivateProfileStructA
GetFileAttributesA
GetDriveTypeA
LocalAlloc
EnumTimeFormatsW
PurgeComm
ReadFileScatter
SetLastError
SetConsoleTitleA
AllocConsole
GetProcessHeap
VirtualLock
ReadConsoleInputW
GetModuleFileNameW
EnumResourceNamesW
WritePrivateProfileStringA
FillConsoleOutputCharacterA
GetVolumeInformationW
lstrcmpiA
GetSystemDefaultLangID
GetLargestConsoleWindowSize
GetAtomNameA
ReadDirectoryChangesW
GetLocaleInfoW
Beep
LeaveCriticalSection
FlushFileBuffers
InitializeCriticalSection
GetBinaryTypeW
GetLongPathNameA
GetDiskFreeSpaceExA
ReleaseSemaphore
GetLogicalDriveStringsA
DuplicateHandle
CreateMutexW
LCMapStringA
OutputDebugStringA
SetMailslotInfo
GetCPInfo
PeekConsoleInputW
GetPrivateProfileStringW
GetDiskFreeSpaceW
GetProfileStringA
SetErrorMode
UnhandledExceptionFilter
GetStartupInfoA
GetFullPathNameA
GetShortPathNameA
SetStdHandle
GetStringTypeExW
GetTimeZoneInformation
ReleaseMutex
lstrcatW
SetThreadAffinityMask
CopyFileExW
PulseEvent
IsBadReadPtr
FreeEnvironmentStringsA
FreeLibrary
EnumResourceNamesA
GetVersionExA
VirtualProtect
GetTapeStatus
ScrollConsoleScreenBufferA
FatalAppExitA
GetOEMCP
GetModuleHandleA
IsProcessorFeaturePresent
IsValidLocale
VirtualFree
lstrlenA
LocalSize
VirtualAlloc
user32
ModifyMenuA
FindWindowExW
DispatchMessageW
EmptyClipboard
SetKeyboardState
SetWindowsHookExW
SetWinEventHook
CharNextA
IsWindow
NotifyWinEvent
MessageBoxExA
DrawStateW
TabbedTextOutW
ShowOwnedPopups
GetProcessDefaultLayout
MapVirtualKeyW
DialogBoxParamA
GetMenuState
GetClassNameA
RedrawWindow
TabbedTextOutA
GetIconInfo
SetFocus
CharToOemA
MessageBoxIndirectW
SetMenuItemInfoA
CharLowerBuffW
LoadStringW
gdi32
FrameRgn
GetMapMode
comdlg32
ChooseFontA
FindTextA
GetFileTitleA
ChooseColorA
advapi32
AddAccessAllowedAce
shell32
DragAcceptFiles
SHLoadInProc
SHFileOperationW
SHGetSpecialFolderLocation
ole32
OleConvertIStorageToOLESTREAM
CoGetObject
GetRunningObjectTable
CoCreateInstance
CoMarshalInterface
CoLockObjectExternal
OleGetIconOfClass
CoUninitialize
OleSetContainedObject
CoResumeClassObjects
oleaut32
LoadTypeLibEx
SafeArrayGetElement
comctl32
_TrackMouseEvent
ImageList_GetBkColor
ImageList_GetImageCount
ord17
shlwapi
PathFindFileNameA
UrlApplySchemeW
StrRStrIW
PathUnquoteSpacesW
PathRemoveFileSpecA
PathAddBackslashW
msvcrt
_exit
_controlfp
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
Sections
.text Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 280KB - Virtual size: 278KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE