Static task
static1
Behavioral task
behavioral1
Sample
da608d3963837b7020416f51ebf17e65_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da608d3963837b7020416f51ebf17e65_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da608d3963837b7020416f51ebf17e65_JaffaCakes118
-
Size
312KB
-
MD5
da608d3963837b7020416f51ebf17e65
-
SHA1
66c3db90eb49d5e4eda39e1bb8669c766f792e83
-
SHA256
6330b349d1b5975f9082f31faf171bc582efcec3173d999d0be6422c84366dab
-
SHA512
83edeb98e0c09ad07301aa59045bb9c6aa485e3d64834289b3a651bcb91c5f01ee138674b0433f393f8331b2ad590eba5a011713461bff73b3717fbcd14d58dc
-
SSDEEP
6144:Rkh6SSiZnnDmuWjGZdc1MXhCthZzy5McEk3V:GhvZRWSIVcEMV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource da608d3963837b7020416f51ebf17e65_JaffaCakes118
Files
-
da608d3963837b7020416f51ebf17e65_JaffaCakes118.exe windows:4 windows x86 arch:x86
d92d8793f998eb13e35459675c86f0d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadPriority
GetCurrentThread
SetThreadPriority
QueryPerformanceFrequency
QueryPerformanceCounter
_llseek
GlobalLock
RtlMoveMemory
FindResourceA
LoadResource
LockResource
GlobalUnlock
Sleep
OpenFile
_lread
_lclose
GlobalAlloc
GetWindowsDirectoryA
HeapReAlloc
SetFilePointer
SetStdHandle
CloseHandle
GetLocaleInfoW
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
GetLocaleInfoA
LoadLibraryA
VirtualAlloc
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapAlloc
HeapFree
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetProcAddress
InterlockedIncrement
InterlockedDecrement
WriteFile
VirtualFree
HeapCreate
HeapDestroy
GetLastError
TlsGetValue
SetLastError
GetLocalTime
TlsAlloc
TlsSetValue
lstrcatA
DeleteCriticalSection
GetFileType
GetStdHandle
WaitForSingleObjectEx
GlobalFree
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
MultiByteToWideChar
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
InterlockedExchange
RtlZeroMemory
lstrcmpiA
CreateThread
lstrlenA
GetCurrentThreadId
lstrcpyA
GetStartupInfoA
GetModuleHandleA
GetCurrentProcess
TerminateProcess
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetCommandLineA
GetVersion
ExitProcess
user32
ClientToScreen
ShowCursor
GetWindowRect
DialogBoxParamA
RegisterClassA
DefDlgProcA
LoadIconA
LoadCursorA
SetForegroundWindow
FindWindowA
LoadStringA
GetSystemMetrics
UnhookWindowsHookEx
EndDialog
InvalidateRect
UpdateWindow
GetDlgItem
PostMessageA
SetWindowsHookExA
ShowWindow
SetWindowTextA
CharNextA
FillRect
GetClientRect
MoveWindow
GetDesktopWindow
IntersectRect
DefWindowProcA
SendMessageA
OffsetRect
DestroyWindow
BeginPaint
GetSystemMenu
EnableMenuItem
DrawTextA
EndPaint
SystemParametersInfoA
GetDC
ReleaseDC
SetRect
CallNextHookEx
SetClassLongA
PtInRect
RegisterClassExA
CreateWindowExA
SetWindowPos
EnableWindow
PeekMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
SetFocus
GetCursorPos
ScreenToClient
gdi32
DeleteObject
SetDIBitsToDevice
StretchDIBits
CreateCompatibleDC
GetStockObject
GetTextExtentPoint32A
TextOutA
CreateFontIndirectA
GetObjectA
SelectObject
SetBkMode
GetDeviceCaps
SetTextColor
RealizePalette
SelectPalette
CreatePalette
UpdateColors
SetBkColor
StretchBlt
BitBlt
CombineRgn
CreateRectRgnIndirect
CreateDIBitmap
DeleteDC
GetRegionData
advapi32
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
ShellExecuteExA
winmm
ord2
Sections
.text Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 216KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ