Static task
static1
Behavioral task
behavioral1
Sample
dd7229f37496a98fdec696c7c1edfafe_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd7229f37496a98fdec696c7c1edfafe_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dd7229f37496a98fdec696c7c1edfafe_JaffaCakes118
-
Size
92KB
-
MD5
dd7229f37496a98fdec696c7c1edfafe
-
SHA1
6f7ff94d7c177673349ee5929589e04c321969dd
-
SHA256
c895b9c3b29990f67273ba8800e98ff062fb3a4bf52766465ab44252254f3d92
-
SHA512
9d407771ad8fb3a3fab82e9430932c4b3282bc20068ebbe72c58aeb744259771e6d7af2577a7e817f747bc46846805e48b639f4b04c6d96af1cd384873444c2a
-
SSDEEP
1536:Y9on25ymvGhuZCwN7PdOTkHxkF1xtODRW2+iSsjeDoL+:Yqk+huZCgdOTrdODRx+i3jeDoy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dd7229f37496a98fdec696c7c1edfafe_JaffaCakes118
Files
-
dd7229f37496a98fdec696c7c1edfafe_JaffaCakes118.exe windows:4 windows x86 arch:x86
a6faf2aa92f6532107085624639ed2ca
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
MoveFileExA
GetShortPathNameA
SetFileAttributesA
GetSystemDirectoryA
GetModuleHandleA
MultiByteToWideChar
GetVersionExA
WideCharToMultiByte
GetEnvironmentVariableA
lstrcpyA
lstrlenA
FreeLibrary
FindClose
CreateDirectoryA
FindNextFileA
WaitForSingleObject
ExitProcess
LCMapStringW
LCMapStringA
SetEndOfFile
GetOEMCP
GetACP
GetCPInfo
CreateFileA
DeleteFileA
FindFirstFileA
Sleep
CloseHandle
RemoveDirectoryA
LoadLibraryA
GetProcAddress
GetCurrentProcess
GetLastError
DuplicateHandle
GetModuleFileNameA
VirtualProtectEx
WriteProcessMemory
ResumeThread
GetThreadContext
GetThreadSelectorEntry
FlushFileBuffers
SetStdHandle
ReadProcessMemory
GetStringTypeW
GetStringTypeA
TerminateProcess
RtlUnwind
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetStartupInfoA
GetCommandLineA
GetVersion
EnterCriticalSection
LeaveCriticalSection
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
InterlockedIncrement
InitializeCriticalSection
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
HeapAlloc
HeapReAlloc
HeapFree
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
ReadFile
SetHandleCount
GetFileType
SetFilePointer
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetUnhandledExceptionFilter
IsBadCodePtr
user32
BeginPaint
GetClientRect
FillRect
EndPaint
GetWindowTextA
SetFocus
GetDlgItem
SendMessageA
EndDialog
LoadIconA
MessageBoxA
FindWindowA
PostMessageA
DialogBoxParamA
SetWindowTextA
gdi32
SetBkMode
CreateSolidBrush
advapi32
AllocateAndInitializeSid
GetUserNameA
RegOpenKeyExA
RegEnumKeyExA
SetNamedSecurityInfoA
OpenProcessToken
RegCloseKey
FreeSid
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
RegDeleteKeyA
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
comctl32
ord17
shlwapi
PathFileExistsA
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ