Static task
static1
Behavioral task
behavioral1
Sample
dff135947337f2ef62bf73fe9853bc21_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dff135947337f2ef62bf73fe9853bc21_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dff135947337f2ef62bf73fe9853bc21_JaffaCakes118
-
Size
180KB
-
MD5
dff135947337f2ef62bf73fe9853bc21
-
SHA1
6605861f8eb032d1e06f42e5e83a5f9526d4b7f2
-
SHA256
9837324d2205c88f87fcbc8bb99aecd4be58fcc3a85c802daf8b74d853afc7c1
-
SHA512
05cac333075a544d0a688880d10aa94f420335449b16b63fc56ad91aa2da2b69fd95b1426a11574af0352c98f675d86f8753cd718b7b94ee2c7ce8a8c6823133
-
SSDEEP
3072:kkhBeIEEiQsm+7STvlE2fzBcM8oiZw7DXr:heIKQNTdJoi3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dff135947337f2ef62bf73fe9853bc21_JaffaCakes118
Files
-
dff135947337f2ef62bf73fe9853bc21_JaffaCakes118.exe windows:4 windows x86 arch:x86
375e99c150899f4a1953b1fbd5bea5aa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryA
InterlockedIncrement
InterlockedDecrement
GetPrivateProfileStringA
WritePrivateProfileStringA
GetShortPathNameA
GetWindowsDirectoryA
TerminateProcess
GetLastError
CreateProcessA
GetModuleFileNameA
GetCurrentThreadId
GetTickCount
lstrlenA
FindFirstFileA
FindNextFileA
FindClose
DeleteFileA
RemoveDirectoryA
lstrcatA
WriteProfileStringA
GlobalLock
_lclose
GlobalHandle
GlobalUnlock
Sleep
LoadLibraryA
OpenProcess
CloseHandle
FreeResource
GetProcAddress
FreeLibrary
LockResource
FindResourceA
LoadResource
_lread
_lopen
_llseek
GetProfileIntA
GlobalAlloc
GetVersion
GetExitCodeProcess
SetEnvironmentVariableA
GetTimeZoneInformation
SetEndOfFile
CreateFileA
CompareStringA
SetStdHandle
GetStringTypeW
FlushFileBuffers
LCMapStringW
LCMapStringA
GetStringTypeA
RtlUnwind
GetFileType
MultiByteToWideChar
SetHandleCount
GetEnvironmentStringsW
GetStdHandle
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetEnvironmentStrings
CompareStringW
GlobalFree
GetSystemTimeAsFileTime
MoveFileA
WriteFile
SetFilePointer
UnhandledExceptionFilter
HeapReAlloc
ReadFile
VirtualFree
HeapCreate
VirtualAlloc
GetOEMCP
GetACP
HeapDestroy
GetCurrentDirectoryA
GetCPInfo
WideCharToMultiByte
GetCurrentProcess
GetFullPathNameA
GetCommandLineA
GetStartupInfoA
ExitProcess
GetLocalTime
GetSystemTime
GetModuleHandleA
HeapAlloc
GetDriveTypeA
HeapFree
FileTimeToSystemTime
GetFileAttributesA
SetFileAttributesA
FileTimeToLocalFileTime
user32
ReleaseDC
FillRect
WaitForInputIdle
PostQuitMessage
GetDC
PostThreadMessageA
GetClientRect
PostMessageA
ShowCursor
PeekMessageA
IsWindow
GetWindowThreadProcessId
GetSystemMetrics
AttachThreadInput
SetForegroundWindow
GetTopWindow
SetWindowPos
ShowWindow
GetForegroundWindow
SystemParametersInfoA
EnumWindows
FindWindowExA
SendMessageA
GetWindowLongA
MessageBoxA
DialogBoxParamA
GetWindow
LoadStringA
CheckDlgButton
GetDlgItem
EnableWindow
SetTimer
DefWindowProcA
KillTimer
CreateWindowExA
LoadIconA
RegisterClassA
GetParent
InvalidateRect
UpdateWindow
CreateDialogParamA
BeginPaint
EndPaint
TranslateMessage
GetMessageA
IsDialogMessageA
SetRect
DispatchMessageA
DestroyWindow
GetDlgItemTextA
IsDlgButtonChecked
gdi32
SetDIBitsToDevice
SelectObject
CreateCompatibleDC
StretchBlt
BitBlt
RealizePalette
GetObjectA
TextOutA
SetBkColor
SelectPalette
GetStockObject
GetTextMetricsA
SetTextColor
DeleteObject
CreateDIBitmap
CreatePalette
DeleteDC
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ