Static task
static1
Behavioral task
behavioral1
Sample
db253c4efc317ff2be6b3abfaa97b057_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
db253c4efc317ff2be6b3abfaa97b057_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
db253c4efc317ff2be6b3abfaa97b057_JaffaCakes118
-
Size
2.9MB
-
MD5
db253c4efc317ff2be6b3abfaa97b057
-
SHA1
7f84eebda96cc1b116940106b780b05d213ae96e
-
SHA256
7403645d409e51ebde796c1d72cd3d70ed535f015c5b01587fefdad4c4d8fc4f
-
SHA512
b16301120ca419d79f28a47a7ff05a2966af803e990381884672b22c599438455c8580c42e331cb42395456c7f319aaa7ec99a72a8fac378f794e02f32a93388
-
SSDEEP
24576:R6h4s7vzGuMvFHq+gZGGjuqj2h6qxchhwEb5/tzJqsvTWxjrH5NW+NonNGQdNWUm:R0/MdHf3G0xcMWtdqsLcr8B9bPNO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db253c4efc317ff2be6b3abfaa97b057_JaffaCakes118
Files
-
db253c4efc317ff2be6b3abfaa97b057_JaffaCakes118.exe windows:5 windows x86 arch:x86
ecc8fe514762e0dd3c54ae9ef0837e67
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DdeInitializeW
EnumDisplayDevicesW
CopyIcon
GetShellWindow
SetScrollRange
IsWindowEnabled
EnableWindow
ToAsciiEx
oleaut32
RegisterTypeLi
SafeArrayPtrOfIndex
VarCyFromStr
SafeArrayAccessData
kernel32
CreateTimerQueue
SetStdHandle
GetStringTypeW
LoadLibraryW
LCMapStringW
SetFilePointerEx
VirtualAlloc
PulseEvent
GetCommTimeouts
GetSystemTimeAsFileTime
TzSpecificLocalTimeToSystemTime
FileTimeToSystemTime
OpenFileMappingW
GetProfileIntW
CreateFileW
GetThreadLocale
CloseHandle
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
HeapReAlloc
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
EncodePointer
DecodePointer
RtlUnwind
GetCommandLineW
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetTickCount
GetModuleHandleW
GetProcAddress
CreateSemaphoreW
GetLastError
CreateThread
ExitThread
LoadLibraryExW
RaiseException
HeapFree
WriteConsoleW
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsDebuggerPresent
HeapAlloc
HeapSize
OutputDebugStringW
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
VirtualFree
VirtualProtect
ReleaseSemaphore
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
shell32
SHCreateDirectoryExW
SHGetFileInfoW
Shell_NotifyIconW
SHGetSpecialFolderPathW
SHFileOperationW
ShellExecuteW
SHGetDesktopFolder
SHBindToParent
SHPathPrepareForWriteW
ShellExecuteExW
Sections
.text Size: 228KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gonw Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.4yhorl Size: 327KB - Virtual size: 328KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 723KB - Virtual size: 723KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ