Static task
static1
Behavioral task
behavioral1
Sample
dc8394e7cecb09d681ceecd634cef072_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc8394e7cecb09d681ceecd634cef072_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc8394e7cecb09d681ceecd634cef072_JaffaCakes118
-
Size
595KB
-
MD5
dc8394e7cecb09d681ceecd634cef072
-
SHA1
07d466dd84b69c8c1e3621cb80b1d5b394afbcd3
-
SHA256
f7a87cb3a517c0f87f6f6772ecb51d49ff3d040a3adcf174d60a84d72c9f9583
-
SHA512
d9cfbd99c855efbc57a7f9d4f78f1312498d625024ed9ab4c597cdf1160f4335d5ffa3b80e89852ce5b9347211a70712a97aa5d68edaa8897d741df1311ac591
-
SSDEEP
12288:e3Kz90EGzIBFxx0L9n8PhOwmpMV9GVr8tR/QPt8zb7ND+s:e3Kz9HGzMvx0GZfSeGdI/Qm/h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dc8394e7cecb09d681ceecd634cef072_JaffaCakes118
Files
-
dc8394e7cecb09d681ceecd634cef072_JaffaCakes118.exe windows:4 windows x86 arch:x86
ede4086f78a1414060f7ffb52c1a738f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
SHGetSpecialFolderPathW
SHGetFileInfo
DragAcceptFiles
SHFileOperation
kernel32
GetModuleFileNameW
EnterCriticalSection
GetCurrentProcessId
HeapSize
EnumCalendarInfoW
SetEnvironmentVariableA
GetTickCount
GetEnvironmentStrings
VirtualAlloc
lstrcmpiW
TlsAlloc
CompareStringA
MultiByteToWideChar
TlsSetValue
HeapReAlloc
DeleteCriticalSection
UnhandledExceptionFilter
OpenSemaphoreA
LeaveCriticalSection
GetStdHandle
GetModuleHandleA
SetConsoleScreenBufferSize
QueryPerformanceCounter
EnumResourceLanguagesW
HeapFree
GetSystemTimeAsFileTime
GetStringTypeA
SetHandleCount
GetCommandLineA
IsBadWritePtr
FlushFileBuffers
CreateMutexA
GetFileType
SetFilePointer
CloseHandle
HeapDestroy
GetLocalTime
EnumSystemCodePagesW
ReadFile
GetTimeZoneInformation
GetEnvironmentStringsW
GetCommandLineW
ExitProcess
RtlUnwind
InterlockedIncrement
OpenMutexA
TerminateProcess
InitializeCriticalSection
GetProcAddress
GetVersion
GetCPInfo
InterlockedDecrement
WideCharToMultiByte
TlsFree
VirtualFree
InterlockedExchange
OpenEventW
FreeEnvironmentStringsW
TlsGetValue
FreeEnvironmentStringsA
GetStartupInfoW
SetStdHandle
lstrcatA
lstrcpyA
VirtualQuery
WriteFile
HeapAlloc
LCMapStringA
LCMapStringW
CompareStringW
LoadLibraryA
HeapCreate
GetStringTypeW
GetCurrentThread
GetLastError
GetModuleFileNameA
GetSystemTime
GetStartupInfoA
GetCurrentThreadId
SetLastError
GetCurrentProcess
user32
wvsprintfA
SetClassLongW
GetClipboardFormatNameW
UpdateWindow
GetSysColor
SetScrollRange
GetWindowTextLengthW
SetDoubleClickTime
GetClassInfoExA
SetThreadDesktop
OpenWindowStationA
DefWindowProcA
MessageBoxW
CreateWindowExW
WaitForInputIdle
GetMenuState
GetMenuItemCount
ShowWindow
SetClipboardViewer
DlgDirListW
FindWindowExA
DrawStateW
CallWindowProcW
ExcludeUpdateRgn
PeekMessageW
DestroyWindow
RegisterClassA
RegisterClassExA
GetUserObjectSecurity
EndMenu
ChangeMenuW
comctl32
ImageList_DrawEx
DrawStatusTextW
ImageList_LoadImageA
DestroyPropertySheetPage
CreateStatusWindowA
InitCommonControlsEx
ImageList_SetBkColor
ImageList_SetFilter
ImageList_Copy
ImageList_GetBkColor
ImageList_GetDragImage
ImageList_GetIcon
ImageList_DragMove
CreateToolbarEx
CreateMappedBitmap
ImageList_DrawIndirect
ImageList_SetDragCursorImage
ImageList_LoadImageW
Sections
.text Size: 221KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 243KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 114KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ