Static task
static1
Behavioral task
behavioral1
Sample
d6b05c0e61dff24549ef8019ca458488_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6b05c0e61dff24549ef8019ca458488_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d6b05c0e61dff24549ef8019ca458488_JaffaCakes118
-
Size
15.2MB
-
MD5
d6b05c0e61dff24549ef8019ca458488
-
SHA1
7779d3f0a301f2970333bd975c83cc882fdb549e
-
SHA256
f4777ff187acc6fa8ee64f090d58d7767ac5a35e9a25ab29dc894f6049ec44f4
-
SHA512
39c9acf7a8827699361301508ebd87b71ac70d04dbef1fb0b53b1f1004710bfbd3229f87470d2f4f6f2c90cb909599c100c1191bed68af915a8c1114c240d129
-
SSDEEP
393216:FeeLDrIw1LBOV7jErQtHIoBV4FDUH8KkCU79iih0l:RLDVBOV7jEWVmF4BvU79iZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d6b05c0e61dff24549ef8019ca458488_JaffaCakes118
Files
-
d6b05c0e61dff24549ef8019ca458488_JaffaCakes118.exe windows:4 windows x86 arch:x86
6e3526d19a617c16adffe95ff271aa69
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileTime
SetFileAttributesA
CompareFileTime
GetFileAttributesA
lstrcmpA
GetVolumeInformationA
lstrcpyA
GetEnvironmentVariableA
GetModuleFileNameA
GetCurrentThreadId
GetUserDefaultLangID
GetVersionExA
GetModuleHandleA
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
SearchPathA
CreateDirectoryA
CompareStringA
IsDBCSLeadByte
DeleteFileA
FindResourceA
SizeofResource
LoadResource
LockResource
FreeResource
MultiByteToWideChar
lstrcpynA
lstrlenA
SetFileTime
GetStartupInfoA
LocalAlloc
CreateFileA
GetFileSize
SetLastError
SetFilePointer
GetLastError
LocalFree
CloseHandle
ReadFile
GetCurrentDirectoryA
WriteFile
user32
GetSystemMetrics
SetWindowTextA
SendDlgItemMessageA
SetFocus
KillTimer
UnhookWindowsHookEx
SetWindowsHookExA
GetClassInfoA
CharLowerA
SetTimer
IsIconic
DestroyIcon
MoveWindow
SendMessageA
DrawIcon
ReleaseDC
GetDC
GetDesktopWindow
EndPaint
GetDlgItem
EnableWindow
GetDlgItemTextA
PostMessageA
SetDlgItemTextA
PeekMessageA
IsDialogMessageA
BeginPaint
LoadIconA
TranslateMessage
DispatchMessageA
wsprintfA
CharNextA
CharPrevA
EndDialog
MessageBoxA
GetWindowLongA
CallNextHookEx
DialogBoxIndirectParamA
SystemParametersInfoA
GetWindowRect
CharUpperA
gdi32
GetMapMode
SetMapMode
GetStockObject
GetDeviceCaps
GetObjectA
comdlg32
GetFileTitleA
GetOpenFileNameA
advapi32
RegQueryValueExA
RegCreateKeyA
RegSetValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
shell32
ShellExecuteA
crtdll
_fmode_dll
_global_unwind2
exit
_commode_dll
_local_unwind2
strchr
strrchr
atoi
_exit
_XcptFilter
_acmdln_dll
_initterm
__GetMainArgs
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 181B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ