Static task
static1
Behavioral task
behavioral1
Sample
August18-Picture22-JPG.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
August18-Picture22-JPG.exe
Resource
win10v2004-20240802-en
General
-
Target
df516358ef586479076525d45278fed8_JaffaCakes118
-
Size
18KB
-
MD5
df516358ef586479076525d45278fed8
-
SHA1
96053195e474b01376053be18b0594be8f03ee7e
-
SHA256
393b0e896f6d1d24048ca85b9806fc497c8b09e3a6c89b796bab0070588fbb5a
-
SHA512
84ac86d72350bafd98942e90bcb70ab76e2f118c62fd5a7839ef53e73e100dd77085f2a006ae7447b9fdbfb1c52c3c4d3dc9e75c35e5f8482217e5b32447d444
-
SSDEEP
384:f+VRzj9APPIl0XyYnQJTQzve/hdiNSZc/o6QM+YPgaOBBb:WXWPAl05nQye/YSZc/tQM+SOn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/August18-Picture22-JPG.exe
Files
-
df516358ef586479076525d45278fed8_JaffaCakes118.zip
-
August18-Picture22-JPG.exe.exe windows:4 windows x86 arch:x86
5024f67986ebf95d0e3d879186c39860
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileSize
GetFullPathNameW
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetPrivateProfileStringW
GetProcAddress
GetShortPathNameW
GetSystemDirectoryW
GetTempFileNameW
GetTempPathW
GetTickCount
GetVersion
GetVersionExW
GetWindowsDirectoryW
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryA
LoadLibraryExW
LoadLibraryW
MoveFileW
MulDiv
GetFileAttributesW
OpenProcess
ReadFile
RemoveDirectoryW
SearchPathW
SetCurrentDirectoryW
SetErrorMode
SetFileAttributesW
SetFilePointer
SetFileTime
Sleep
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringW
lstrcatW
lstrcmpW
lstrcmpiA
lstrcmpiW
lstrcpyA
lstrcpyW
lstrcpynA
lstrcpynW
lstrlenA
lstrlenW
GetExitCodeProcess
GetDiskFreeSpaceW
GetCurrentProcess
GetCommandLineW
FreeLibrary
FindNextFileW
FindFirstFileW
FindClose
ExpandEnvironmentStringsW
ExitProcess
DeleteFileW
CloseHandle
CreateThread
CreateProcessW
CreateFileW
CreateDirectoryW
CopyFileW
CompareFileTime
MultiByteToWideChar
user32
GetClientRect
GetDC
GetDlgItem
GetDlgItemTextW
GetMessagePos
GetSysColor
GetSystemMenu
GetSystemMetrics
GetWindowLongW
GetWindowRect
InvalidateRect
IsWindow
IsWindowEnabled
IsWindowVisible
LoadBitmapW
LoadCursorW
LoadImageW
MessageBoxIndirectW
OpenClipboard
PeekMessageW
PostQuitMessage
RegisterClassW
ScreenToClient
SendMessageTimeoutW
GetClassInfoW
SetClassLongW
SetClipboardData
SetCursor
SetDlgItemTextW
SetForegroundWindow
SetTimer
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
SystemParametersInfoW
TrackPopupMenu
wsprintfA
wsprintfW
EnableMenuItem
EmptyClipboard
DrawTextW
DispatchMessageW
DialogBoxParamW
DestroyWindow
DefWindowProcW
CreatePopupMenu
CreateDialogParamW
FindWindowExW
FillRect
ExitWindowsEx
EndPaint
EndDialog
SendMessageW
EnableWindow
CloseClipboard
CheckDlgButton
CharUpperW
CharPrevW
CharNextW
CharNextA
CallWindowProcW
BeginPaint
AppendMenuW
CreateWindowExW
gdi32
SetTextColor
SetBkMode
SetBkColor
SelectObject
GetDeviceCaps
DeleteObject
CreateFontIndirectW
CreateBrushIndirect
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetFileInfoW
SHFileOperationW
SHBrowseForFolderW
ShellExecuteW
advapi32
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegEnumKeyW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ