Static task
static1
Behavioral task
behavioral1
Sample
d3ea4959354f0342c2bc272b10136053_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3ea4959354f0342c2bc272b10136053_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d3ea4959354f0342c2bc272b10136053_JaffaCakes118
-
Size
75KB
-
MD5
d3ea4959354f0342c2bc272b10136053
-
SHA1
603422aa160deb03ed1edc56b2f0ca0bc2826b43
-
SHA256
8a00b7882d33b995d76528a46a368b46321c45f6f16886d02ec6a3f73213e56a
-
SHA512
3ebd6f3661e65928a312d158d2e7cdb7bb5e1f7d8b06830cc764e41663fd61b2eaa7a09bdc2d33413e69f26bb00032d5265541e24e627fdd9ca22b21f6019f2b
-
SSDEEP
1536:ohm9NJHQP6Kw3UWQnCKtU1RWB9WOO6Udby78QFJ:/VPZ3UWpKWRMe6Ud27X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3ea4959354f0342c2bc272b10136053_JaffaCakes118
Files
-
d3ea4959354f0342c2bc272b10136053_JaffaCakes118.exe windows:4 windows x86 arch:x86
a5e271e034cb008d607c9730dced824a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
GetModuleFileNameA
GetShortPathNameA
GetVersionExA
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
GetTimeZoneInformation
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetSystemDirectoryA
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetProcAddress
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
GetOEMCP
GetACP
GetCPInfo
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
LocalAlloc
LocalFree
GetCurrentDirectoryA
SetCurrentDirectoryA
FreeLibrary
GetEnvironmentStrings
LoadLibraryA
GetExitCodeProcess
CreateProcessA
lstrcatA
lstrlenA
WinExec
CloseHandle
GetLastError
SetFilePointer
WriteFile
ReadFile
GetEnvironmentVariableA
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
CreateFileA
LCMapStringW
SetFileAttributesA
GetFileAttributesA
ExitProcess
TerminateProcess
GetCurrentProcess
HeapCompact
HeapAlloc
HeapReAlloc
HeapFree
RemoveDirectoryA
DeleteFileA
FindFirstFileA
FindNextFileA
SetEnvironmentVariableA
user32
SendMessageA
GetWindow
GetSystemMetrics
CreateWindowExA
LoadIconA
LoadCursorA
RegisterClassA
CreateDialogParamA
GetDlgItem
DestroyWindow
PostQuitMessage
DefWindowProcA
CharToOemA
DialogBoxParamA
EndDialog
SetDlgItemTextA
TranslateMessage
DispatchMessageA
GetMessageA
IsDialogMessageA
SetWindowLongA
SetWindowTextA
MessageBoxA
wsprintfA
PeekMessageA
gdi32
DeleteObject
RemoveFontResourceA
GetObjectA
CreateFontIndirectA
GetStockObject
advapi32
RegQueryValueExA
RegQueryValueA
RegEnumKeyExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
shell32
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
ole32
OleUninitialize
OleInitialize
comctl32
ord17
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ