Static task
static1
Behavioral task
behavioral1
Sample
fd32e700bc61df774ab8c918787e150e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd32e700bc61df774ab8c918787e150e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fd32e700bc61df774ab8c918787e150e_JaffaCakes118
-
Size
12.3MB
-
MD5
fd32e700bc61df774ab8c918787e150e
-
SHA1
dc48fd6d765f7f3866ccb2f18862ba4929f0c819
-
SHA256
1a805d26df80410a460529773e0e0a6ec47dc7ca81f499e201abe191b8365f1c
-
SHA512
e4b799c49c960c30dc93dfa2da46572474c0c3ff9707a860076352c4f84800e09e3d9c1b2814495c4affaf3ce9a1341a28eecc49bdec39d36fbee5d567b75909
-
SSDEEP
393216:zeWdtuDXV9jnxXhZmpR1RZ16odETF/nNJ+:zes2rjxXhg/Z1TdcFfi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fd32e700bc61df774ab8c918787e150e_JaffaCakes118
Files
-
fd32e700bc61df774ab8c918787e150e_JaffaCakes118.exe windows:4 windows x86 arch:x86
774de2cf8feef846bca7568f7cbdd5aa
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
_lcreat
GetTempPathA
GetCurrentDirectoryA
_lwrite
GetFullPathNameA
LoadLibraryExW
CreateDirectoryA
SetCurrentDirectoryA
LoadLibraryExA
LoadLibraryW
Sleep
WideCharToMultiByte
DeleteCriticalSection
IsBadReadPtr
WriteProcessMemory
GetCurrentProcess
LoadLibraryA
InitializeCriticalSection
MultiByteToWideChar
SetFileAttributesA
FindNextFileA
WritePrivateProfileStringA
RemoveDirectoryA
GetTickCount
GetDiskFreeSpaceA
CreateThread
CloseHandle
ResumeThread
SuspendThread
FlushFileBuffers
WinExec
GetVersion
GetACP
CreateEventA
OpenEventA
GetSystemDirectoryA
FindFirstFileA
FindClose
GetModuleFileNameA
_lclose
_llseek
_lread
_lopen
GetFileSize
lstrcmpiA
lstrlenA
lstrcpyA
GetWindowsDirectoryA
lstrcatA
LocalFree
DeleteFileA
GetPrivateProfileIntA
FreeLibrary
GetProcAddress
GetModuleHandleA
OpenFile
VirtualAlloc
SetUnhandledExceptionFilter
WriteFile
VirtualFree
LocalAlloc
HeapDestroy
GetStdHandle
HeapCreate
SetHandleCount
GetOEMCP
GetFileType
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetCPInfo
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetEnvironmentStrings
ExitProcess
HeapAlloc
TerminateProcess
GetCommandLineA
GetStartupInfoA
HeapFree
IsBadWritePtr
IsBadCodePtr
RtlUnwind
HeapReAlloc
HeapSize
user32
SetDlgItemTextA
GetCursorPos
ScreenToClient
EnableWindow
ShowWindow
GetDlgItem
GetWindowRect
SetWindowPos
PostMessageA
MoveWindow
ReleaseDC
DrawIcon
GetDC
IsDlgButtonChecked
KillTimer
LoadCursorA
GetClassLongA
LoadIconA
SendMessageA
LoadStringA
wsprintfA
UpdateWindow
RegisterClassA
CreateWindowExA
BeginPaint
GetClientRect
DefWindowProcA
GetMessageA
EndPaint
PostQuitMessage
TranslateMessage
IsWindow
IsDialogMessageA
DialogBoxParamA
DispatchMessageA
EndDialog
ExitWindowsEx
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
MessageBoxA
SetClassLongA
GetDesktopWindow
GetDlgItemTextA
CheckDlgButton
gdi32
DeleteObject
StretchDIBits
RealizePalette
SelectPalette
CreatePalette
SetStretchBltMode
advapi32
RegSetValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyA
RegOpenKeyA
RegQueryValueA
RegDeleteKeyA
RegEnumKeyA
shell32
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
ole32
CoInitialize
CoUninitialize
CoCreateInstance
comctl32
ImageList_LoadImageA
ord17
winmm
ord2
Sections
.text Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ