Static task
static1
Behavioral task
behavioral1
Sample
d10bfd7ba19d851fab55c0c128357a30_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d10bfd7ba19d851fab55c0c128357a30_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d10bfd7ba19d851fab55c0c128357a30_JaffaCakes118
-
Size
258KB
-
MD5
d10bfd7ba19d851fab55c0c128357a30
-
SHA1
075de5f8ee716835eec07a2ea1a7d266fd2d2cc4
-
SHA256
2c90a56e87832a5b844f1c293d95925f9c6b6d520f32ce8a5043ad696505d1d2
-
SHA512
c7fb62937955cbbfdbc42dbec6f36a8ff92ce704d1aaac39cd7d5be30a0f9e9bf171f17d39ad6a783fe44f8e56ebba538a6214e305b7b98f74b4dcddd8e65e81
-
SSDEEP
6144:/perJRwEh2KyXzKXOtjBmfsNH5SoKZ2Ok37jOrgpxuLeMGL6KX3UW:i0Eh8XeetjsfoCRk3fHxAs+K3U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d10bfd7ba19d851fab55c0c128357a30_JaffaCakes118
Files
-
d10bfd7ba19d851fab55c0c128357a30_JaffaCakes118.exe windows:4 windows x86 arch:x86
4a2fa7abc9171dba8ae43d97100eb6aa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
WaitForSingleObject
Sleep
GetVersion
GetVersionExW
GetCurrentProcessId
WaitForMultipleObjects
DuplicateHandle
SetEvent
OpenMutexW
LocalFree
LocalAlloc
GetModuleHandleA
lstrcmpA
GetCurrentThread
GetTickCount
GetModuleFileNameW
GetTempPathW
GetTempFileNameW
CreateEventW
InitializeCriticalSection
CreateSemaphoreW
lstrcpynA
lstrlenA
GetFullPathNameA
GetFileAttributesA
lstrcpynW
lstrlenW
GetFileAttributesW
MultiByteToWideChar
GetModuleHandleW
ExpandEnvironmentStringsW
FreeLibrary
LoadLibraryW
SetErrorMode
GetCurrentProcess
CreateMutexW
GetLastError
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LoadLibraryA
QueryPerformanceCounter
GetVersionExA
GetProcessHeap
RaiseException
SetUnhandledExceptionFilter
TlsAlloc
ExitProcess
HeapCreate
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStartupInfoA
GetEnvironmentStringsW
GetLocalTime
GetProcAddress
user32
MessageBoxW
PeekMessageW
DefWindowProcA
GetMenu
SetWindowPos
CreatePopupMenu
GetClassInfoExA
SendDlgItemMessageW
GetMenuItemRect
RegisterWindowMessageW
GetCapture
MessageBoxA
GetCaretPos
MessageBoxIndirectA
SetCursor
mouse_event
SendMessageW
GetSubMenu
CharPrevW
GetAsyncKeyState
GetMessageA
GetMenuItemID
OpenClipboard
LoadBitmapW
CharLowerW
GetClassInfoA
GetDlgItemTextW
DialogBoxIndirectParamW
advapi32
RegQueryValueExA
RegOpenKeyA
FreeSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
RegEnumKeyW
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
RegDeleteKeyA
EqualSid
shell32
SHGetDesktopFolder
ShellExecuteExW
ord680
ole32
CoUninitialize
CoInitializeEx
security
SealMessage
CompleteAuthToken
gdi32
CreatePalette
CreateEllipticRgn
TranslateCharsetInfo
GetRasterizerCaps
CreateColorSpaceA
CreateFontW
CreateRoundRectRgn
GetTextExtentPointW
SelectBrushLocal
Sections
.text Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.FTPE Size: 2KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.s Size: 1024B - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.i Size: 92KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.j Size: 5KB - Virtual size: 370KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kLjQcb Size: 1KB - Virtual size: 469KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 383KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.TEURV Size: 124KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ