Static task
static1
Behavioral task
behavioral1
Sample
00260acd8397859bbcf2c019a3715db8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00260acd8397859bbcf2c019a3715db8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
00260acd8397859bbcf2c019a3715db8_JaffaCakes118
-
Size
75KB
-
MD5
00260acd8397859bbcf2c019a3715db8
-
SHA1
d7844a8372c5e497287677a73e4432619834114f
-
SHA256
b6dda684ff262b679c75291c32d10c421527768f66bbb7b2dda635f1ede9d372
-
SHA512
67632553a8b41c08ffa0c7cf935ece43ee2cb6eb6fc9b714c0bf12ba839b4dd568735a6814583b1f53fc120723348d8c896d7aebd0e6de5a738e3c5ceb94abc9
-
SSDEEP
1536:jrFk7fFczCbrO1vXYrtYwoIkCtoPWInmLzT7g2x/CtrIgdYQW:jpAbOYr9rtAmLzTtxKtpYQW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00260acd8397859bbcf2c019a3715db8_JaffaCakes118
Files
-
00260acd8397859bbcf2c019a3715db8_JaffaCakes118.exe windows:4 windows x86 arch:x86
538b24d6329dec5462500868f42b5918
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
comctl32
InitCommonControls
gdi32
MoveToEx
LineTo
SetTextColor
CreateFontIndirectA
SetBkMode
DeleteObject
SelectObject
CreatePen
GetObjectA
GetStockObject
kernel32
CreateThread
GetTickCount
Sleep
RtlMoveMemory
GetLastError
CreateMutexA
ReleaseMutex
GetFullPathNameA
CreateFileA
lstrlen
GetLocaleInfoA
lstrcpyn
GetUserDefaultLCID
GetTimeFormatA
GetDateFormatA
GetFileAttributesA
SetThreadLocale
SetLastError
GetProcAddress
LoadLibraryA
GetDiskFreeSpaceA
GetModuleFileNameA
AreFileApisANSI
RtlZeroMemory
FlushFileBuffers
WriteFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapSize
GetConsoleMode
GetConsoleCP
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
InitializeCriticalSection
IsDebuggerPresent
SetUnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetFileType
GetVolumeInformationW
GetVersion
CloseHandle
GetModuleHandleA
DeviceIoControl
GetLocalTime
VirtualAlloc
SetThreadPriority
MultiByteToWideChar
ReadFile
CreateEventA
WideCharToMultiByte
VirtualFree
SetEvent
WaitForSingleObject
GetCurrentProcess
LockResource
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
SetFilePointer
ExitProcess
HeapReAlloc
EnterCriticalSection
HeapFree
HeapAlloc
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
HeapDestroy
HeapCreate
DeleteCriticalSection
LeaveCriticalSection
shell32
ShellExecuteA
SHGetMalloc
SHGetPathFromIDList
SHGetDesktopFolder
user32
LoadCursorA
GetDlgCtrlID
SetDlgItemTextA
UpdateWindow
EnableWindow
GetWindowRect
DialogBoxParamA
EndPaint
ClientToScreen
SetCursor
GetDlgItemInt
SetTimer
ScreenToClient
SendDlgItemMessageA
FillRect
KillTimer
LoadIconA
SendMessageA
BeginPaint
PtInRect
TranslateMessage
SetDlgItemInt
OffsetRect
InvalidateRect
PeekMessageA
GetDlgItem
EndDialog
ShowWindow
IsDlgButtonChecked
PostMessageA
DispatchMessageA
CheckRadioButton
MessageBoxW
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
winmm
timeGetTime
Sections
.text Size: 50KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mackt Size: 3KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE