Static task
static1
Behavioral task
behavioral1
Sample
fda4432cf5fd0bc94fc0d1f350fc0284_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fda4432cf5fd0bc94fc0d1f350fc0284_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fda4432cf5fd0bc94fc0d1f350fc0284_JaffaCakes118
-
Size
805KB
-
MD5
fda4432cf5fd0bc94fc0d1f350fc0284
-
SHA1
83484bfaa43f13a81a2dd1f2e751bb324ca60075
-
SHA256
6c020e36dbc7ae24bde21ab31fa0c970eae39b4c948e2325a8557287ff3fa226
-
SHA512
f60bffa562b3a3842f25df2c3b8a10ddd0f6b2e5c2dd54f1c6e15e2c2c945ae7fee9c61d8697670dfabed0d8556d333abe5dca955aad8b26323df50dcf857446
-
SSDEEP
12288:CUcVZcTb/csDJ4Dn1C1BalZrsdJueNqluhgx3Y:4VCDJs0O28eBf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fda4432cf5fd0bc94fc0d1f350fc0284_JaffaCakes118
Files
-
fda4432cf5fd0bc94fc0d1f350fc0284_JaffaCakes118.exe windows:5 windows x86 arch:x86
0e1162a27b768780f61c55475fdf4a7c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
LocalAlloc
DeleteCriticalSection
Sleep
GetLastError
Sleep
lstrcmpiW
GetModuleFileNameA
LoadLibraryA
GetModuleFileNameA
MultiByteToWideChar
GetLastError
MultiByteToWideChar
SetLastError
FreeLibrary
lstrlenA
FreeLibrary
SetLastError
GetSystemTimeAsFileTime
GetProcAddress
LoadLibraryW
GetProcessHeap
InterlockedDecrement
FreeLibrary
DeleteCriticalSection
lstrcmpiW
VirtualProtect
UnhandledExceptionFilter
DeleteCriticalSection
InterlockedDecrement
LoadLibraryA
InitializeCriticalSection
GetSystemTimeAsFileTime
LoadLibraryA
lstrcmpiW
GetLastError
LocalFree
DeleteCriticalSection
lstrlenA
DeleteCriticalSection
EnterCriticalSection
HeapDestroy
GetModuleHandleW
InterlockedDecrement
GetTickCount
LocalFree
InterlockedDecrement
VirtualProtect
LocalFree
DeleteCriticalSection
CreateEventW
SetLastError
GetModuleFileNameA
LocalFree
InterlockedExchange
CreateFileW
GetVersionExA
GetTickCount
LocalAlloc
VirtualProtect
GetLastError
DisableThreadLibraryCalls
GetLastError
SetLastError
DeleteCriticalSection
ReadFile
InterlockedDecrement
GetProcessHeap
GetProcAddress
DisableThreadLibraryCalls
InterlockedDecrement
CreateFileW
CreateFileW
GetModuleHandleA
InitializeCriticalSection
GetSystemTimeAsFileTime
InterlockedDecrement
ReadFile
CreateEventW
VirtualAlloc
GetTickCount
GetProcAddress
Sleep
GetModuleHandleA
DisableThreadLibraryCalls
LocalFree
user32
DispatchMessageW
EndDialog
SetWindowPos
SetFocus
GetWindowRect
GetClientRect
MessageBoxW
GetSysColor
SetWindowPos
CreateWindowExW
ReleaseDC
EnableWindow
SetWindowLongW
wsprintfA
TranslateMessage
GetWindowRect
SetWindowPos
GetDesktopWindow
DefWindowProcW
DialogBoxParamW
EnableWindow
GetWindowRect
LoadIconW
SetWindowTextW
SetForegroundWindow
PostMessageW
GetFocus
IsDlgButtonChecked
SetCursor
PostMessageW
GetDC
GetDC
SetWindowTextW
CreateWindowExW
SendMessageW
DestroyWindow
InvalidateRect
BeginPaint
PeekMessageW
ReleaseDC
SetDlgItemTextW
EnableWindow
DialogBoxParamW
PeekMessageW
SetDlgItemTextW
GetDlgItem
EndPaint
IsDlgButtonChecked
GetWindowRect
ReleaseDC
GetDesktopWindow
GetWindowRect
TranslateMessage
SetFocus
GetParent
DefWindowProcW
GetDlgItem
ShowWindow
DefWindowProcW
ShowWindow
GetClientRect
ShowWindow
LoadStringW
InvalidateRect
DefWindowProcW
GetSysColor
SetFocus
BeginPaint
SetForegroundWindow
ReleaseDC
GetDesktopWindow
SetTimer
BeginPaint
InvalidateRect
GetDlgItem
BeginPaint
PostMessageW
KillTimer
PeekMessageW
BeginPaint
SetTimer
wsprintfA
DefWindowProcW
DispatchMessageW
GetSystemMetrics
DialogBoxParamW
SendDlgItemMessageW
Sections
.text Size: 718KB - Virtual size: 968KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 82KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ