Static task
static1
Behavioral task
behavioral1
Sample
da3d358f423c6a39c3df50b879f928fd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da3d358f423c6a39c3df50b879f928fd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da3d358f423c6a39c3df50b879f928fd_JaffaCakes118
-
Size
2.0MB
-
MD5
da3d358f423c6a39c3df50b879f928fd
-
SHA1
02f47a7176dec3eb332a085ee62ed2d090a54012
-
SHA256
d8c6e7bedcfea5aec3b63875bce3aa57c3b7fa9e19a20c400a86cb836e064820
-
SHA512
0774af38ca0fcb30babe9690c6f16e2fd4b64fcd33b2b6b69b57aa4b90efaa9e80db3d48765272f40cf4f1dd6f181bea6db588184cbe846cd6a78d18d306c485
-
SSDEEP
24576:YIUrPtK2wLiLZeoywpKrxhDf5PBVm7OA0bg7kxUNxLLLL9LLLLLL/0:Y5Cd6KZdqlxLLLL9LLLLLL/0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource da3d358f423c6a39c3df50b879f928fd_JaffaCakes118
Files
-
da3d358f423c6a39c3df50b879f928fd_JaffaCakes118.exe windows:5 windows x86 arch:x86
e76c9035358930aa429fac7ff79be74e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CLSIDFromProgID
user32
GetTitleBarInfo
TranslateMDISysAccel
GetScrollInfo
GetWindow
WindowFromPoint
GetPropW
EnableScrollBar
GetScrollPos
SetWindowRgn
ReleaseDC
InsertMenuItemW
RemoveMenu
GetSubMenu
DestroyMenu
GetMenu
SetFocus
CharNextW
GetDlgItem
GetClassInfoW
SendMessageTimeoutW
PeekMessageW
DrawEdge
advapi32
RegEnumValueW
kernel32
LCMapStringW
HeapSize
HeapReAlloc
HeapAlloc
OutputDebugStringW
RtlUnwind
LoadLibraryExW
HeapFree
CloseHandle
WriteConsoleW
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
WriteFile
GetVersion
GlobalAlloc
VirtualAlloc
HeapDestroy
GetBinaryTypeW
GetLastError
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
GetFileType
MulDiv
GetTimeZoneInformation
FileTimeToLocalFileTime
FindResourceExW
CreateFileW
AreFileApisANSI
CompareStringW
EnumSystemGeoID
GetThreadLocale
GetStringTypeExW
GetStringTypeW
EnumSystemCodePagesW
GetConsoleWindow
GetCommandLineW
RaiseException
IsProcessorFeaturePresent
EncodePointer
SetLastError
GetCurrentThreadId
DecodePointer
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameW
LeaveCriticalSection
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
EnterCriticalSection
shlwapi
StrChrW
StrCmpNW
StrPBrkW
StrCmpW
StrRetToStrW
SHStrDupW
PathFindExtensionW
PathIsRelativeW
PathIsURLW
PathParseIconLocationW
UrlCanonicalizeW
UrlIsW
SHDeleteEmptyKeyW
SHDeleteValueW
SHSetValueW
AssocQueryStringW
Sections
.text Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 471KB - Virtual size: 6.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 724B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nh4a Size: 386KB - Virtual size: 385KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ew3a Size: 186KB - Virtual size: 186KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sd1r Size: 490KB - Virtual size: 490KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dae5r Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 346KB - Virtual size: 345KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ