Static task
static1
Behavioral task
behavioral1
Sample
fe5072fa619b747b3fcb71f74d019a90_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fe5072fa619b747b3fcb71f74d019a90_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fe5072fa619b747b3fcb71f74d019a90_JaffaCakes118
-
Size
62KB
-
MD5
fe5072fa619b747b3fcb71f74d019a90
-
SHA1
2c7fae76ae0a3dd9ca8ecda48042349d16d74c73
-
SHA256
c2ca6501b2206cf6208ffb3f07feabcc0fb2aa9d70160a66b390ae4d3ff14bb2
-
SHA512
a5754a56b6bd434bd213b2218972020f32e35fe40879f1183807118f92bc1f7382a2aacae98729329f649017be32a301f408c208789102af808b8a13aa348a2c
-
SSDEEP
1536:njEPLkdbkwZbcvGTUx8509FJGONYWQXWZOIb66:62X0GQx85GFJhNYBXWZtb6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe5072fa619b747b3fcb71f74d019a90_JaffaCakes118
Files
-
fe5072fa619b747b3fcb71f74d019a90_JaffaCakes118.exe windows:4 windows x86 arch:x86
5c9b06b6e0083da4570cdcb1456c6a41
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetPixel
AddFontMemResourceEx
ExtTextOutA
ClearBitmapAttributes
BitBlt
ClearBrushAttributes
CloseFigure
SetTextColor
GetBitmapBits
GetClipBox
CancelDC
DeleteObject
BeginPath
CopyMetaFileA
AddFontResourceExA
ExcludeClipRect
GetBrushOrgEx
AddFontResourceTracking
CreateSolidBrush
CloseFigure
GetCurrentPositionEx
DeleteDC
GetClipBox
CloseMetaFile
AddFontResourceExA
AddFontResourceA
GetPixel
SetTextColor
AddFontMemResourceEx
GetDCOrgEx
CancelDC
AddFontResourceW
AbortPath
shell32
FreeIconList
SHFindFiles
DragQueryFileAorW
ExtractIconResInfoW
DragQueryFile
DragQueryPoint
PathGetShortPath
SHDoDragDrop
DragQueryFileW
DragQueryFileA
CheckEscapesA
CheckEscapesW
ExtractIconA
SHUpdateImageW
FindExeDlgProc
DragFinish
ExtractIconA
SHDefExtractIconA
PathGetShortPath
FreeIconList
DragQueryPoint
ShellAboutA
DragAcceptFiles
CommandLineToArgvW
SHUpdateImageW
SHChangeNotifyDeregister
ExtractIconEx
ExtractIconResInfoA
CheckEscapesA
DragFinish
ExtractIconExA
SHDoDragDrop
SHUpdateImageA
DragQueryFileW
ExtractIconResInfoW
ShellAboutA
DllGetVersion
CommandLineToArgvW
DragQueryFileA
SHUpdateImageA
ExtractIconResInfoA
CheckEscapesW
DragQueryPoint
SHDoDragDrop
DragQueryFileW
DragQueryFileAorW
ExtractIconEx
ExtractIconExA
ExtractIconA
DragQueryFile
PathGetShortPath
DragAcceptFiles
SHUpdateImageW
kernel32
OpenFileMappingA
GetLastError
WriteFile
OpenFile
SetLastError
CopyFileA
DeleteAtom
CopyFileExA
CreateProcessA
DeleteFileA
ReadConsoleA
GetStdHandle
GetComputerNameA
ExitThread
GetFileTime
ReadFile
Sleep
DeleteFileW
FindFirstFileA
GetLastError
CopyFileExA
DeleteAtom
DeleteFileA
ReadConsoleA
CopyFileA
FindAtomA
GetFileSize
CreateDirectoryA
WriteFile
GetConsoleMode
GetCommandLineA
GetCPInfo
CreateThread
CopyFileW
CreateProcessA
advapi32
RegQueryInfoKeyW
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExW
RegReplaceKeyA
RegEnumKeyExA
RegOpenKeyExW
RegQueryValueExA
RegQueryValueW
RegDeleteKeyA
RegFlushKey
RegQueryInfoKeyA
RegOpenKeyA
RegDeleteKeyW
RegQueryValueA
RegCreateKeyW
RegEnumValueW
RegCreateKeyW
RegReplaceKeyA
RegCreateKeyExW
RegGetKeySecurity
RegEnumKeyW
RegQueryValueExW
RegEnumKeyExA
RegCreateKeyExA
RegDeleteKeyW
RegFlushKey
RegDeleteValueW
RegEnumKeyA
RegQueryInfoKeyA
RegQueryValueW
RegReplaceKeyW
RegEnumValueA
RegOpenKeyA
RegOpenKeyW
RegOpenKeyExA
RegEnumKeyExW
RegDeleteKeyA
RegEnumValueW
RegOpenKeyExW
RegCreateKeyExW
RegCreateKeyW
RegDeleteValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegCreateKeyExA
RegOpenKeyA
RegReplaceKeyW
RegEnumKeyA
RegEnumValueA
RegReplaceKeyA
RegDeleteKeyA
RegDeleteKeyW
RegQueryInfoKeyW
RegEnumKeyW
RegEnumValueW
RegFlushKey
RegLoadKeyW
RegQueryValueW
RegEnumKeyExW
RegQueryValueExW
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 51KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ