Static task
static1
Behavioral task
behavioral1
Sample
da32929f10d6993c3aa82a6284233b39_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
da32929f10d6993c3aa82a6284233b39_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da32929f10d6993c3aa82a6284233b39_JaffaCakes118
-
Size
470KB
-
MD5
da32929f10d6993c3aa82a6284233b39
-
SHA1
a399faf80d56b95bdcff23c211e1a1437d74e30a
-
SHA256
60c1b97c6dd27c9409e36d506f5dddef9b84fe11e8c2ac724e113378d2b7a16a
-
SHA512
fd092945521e7d9fdde4bf62a3a05c320f7f79ae1831d33dc43d83b5d1c5e8086ae275875431da57e2907c07f4ee15968b86ab4bbe6d70f8bbf85bd70ba3c52f
-
SSDEEP
12288:WLKsuZRMSKk1vYzDqSfnJuQGqTYNXiW3GLMPhsNDNRe:WLKskM3kCCOnsdNXZ3GcsNbe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource da32929f10d6993c3aa82a6284233b39_JaffaCakes118
Files
-
da32929f10d6993c3aa82a6284233b39_JaffaCakes118.exe windows:4 windows x86 arch:x86
82ebbc03673f2ef04ca30793b8b22e8c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
FindTextW
GetSaveFileNameW
ChooseColorA
PageSetupDlgW
comctl32
InitCommonControlsEx
wininet
ResumeSuspendedDownload
DeleteUrlCacheEntry
FtpGetCurrentDirectoryW
FtpSetCurrentDirectoryA
DeleteUrlCacheContainerA
FindFirstUrlCacheContainerA
HttpEndRequestW
FtpPutFileA
user32
IsWindowEnabled
GetShellWindow
RegisterDeviceNotificationA
LoadCursorFromFileW
TabbedTextOutW
LoadMenuIndirectA
CreateWindowExW
GetAltTabInfo
SetMenuInfo
ActivateKeyboardLayout
BroadcastSystemMessage
RegisterClassExA
GetMenuBarInfo
GetDlgItemTextA
OpenWindowStationW
SendMessageA
RegisterClassA
DrawCaption
CallMsgFilterA
DdeUninitialize
kernel32
GetStartupInfoA
IsBadWritePtr
EnterCriticalSection
SetLastError
CompareStringW
InitializeCriticalSection
TlsSetValue
InterlockedExchange
GetCurrentThreadId
LeaveCriticalSection
FreeEnvironmentStringsA
GetCommandLineA
GetStdHandle
FreeEnvironmentStringsW
GetCurrentThread
GetModuleFileNameA
GetTimeZoneInformation
GetCurrentProcessId
TlsFree
LCMapStringW
WriteFile
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetTickCount
InterlockedDecrement
HeapFree
SetHandleCount
LocalLock
TlsGetValue
LCMapStringA
IsValidCodePage
GetStartupInfoW
HeapAlloc
GetOEMCP
GetLastError
GetLocalTime
TerminateProcess
OpenMutexA
GetStringTypeW
GetACP
TlsAlloc
GetSystemTime
GetEnvironmentStringsW
GetCPInfo
SetLocalTime
LoadLibraryA
VirtualQuery
FlushFileBuffers
ReadFile
ReadConsoleOutputA
VirtualFree
RtlUnwind
GetModuleHandleA
SetStdHandle
UnhandledExceptionFilter
GetFileType
HeapReAlloc
GetVersion
HeapCreate
GetProcAddress
CloseHandle
GetEnvironmentStrings
GetThreadTimes
CreateMutexA
HeapDestroy
VirtualAlloc
WideCharToMultiByte
CompareStringA
SetFilePointer
MoveFileA
MultiByteToWideChar
GetCurrentProcess
GetStringTypeA
InterlockedIncrement
ExitProcess
SetEnvironmentVariableA
DeleteCriticalSection
FindResourceW
shell32
DragAcceptFiles
RealShellExecuteW
DragQueryFileAorW
SHQueryRecycleBinW
DragQueryFileA
Sections
.text Size: 145KB - Virtual size: 145KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 312KB - Virtual size: 312KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ