Static task
static1
Behavioral task
behavioral1
Sample
00f738f046ba660f509180758c12dd9c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00f738f046ba660f509180758c12dd9c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
00f738f046ba660f509180758c12dd9c_JaffaCakes118
-
Size
236KB
-
MD5
00f738f046ba660f509180758c12dd9c
-
SHA1
8ce9413b05d1de407ec0ab35bf2bba8b67d60938
-
SHA256
e352d14e3c9ffc372dc2b552650c16c176f4c8c17a52ce365bd9727202da4d90
-
SHA512
950f593fa552c0f5f40d02e428a799d8fcda3c5cc3c2c98503f3be178c0ff09885f663412a2fb20a6c6d699d17758c515966ec7d581d72dc0a4f957dd8b7434e
-
SSDEEP
6144:Tsg96rj+jZhorUDTwB6L+a8byJVcNH1fIunyeslGcD61y:TeiZWUss+rbygNxOeNc24
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00f738f046ba660f509180758c12dd9c_JaffaCakes118
Files
-
00f738f046ba660f509180758c12dd9c_JaffaCakes118.exe windows:4 windows x86 arch:x86
15ce30d2f879460214c371b82a13b515
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetEnvironmentStrings
InterlockedDecrement
SetEndOfFile
CompareStringW
lstrlenA
GlobalAlloc
GetCurrentProcess
GetLocaleInfoA
FreeLibrary
FindClose
GetModuleHandleA
RtlUnwind
GetEnvironmentVariableA
FreeEnvironmentStringsA
LockResource
GetStartupInfoA
GetModuleFileNameA
FlushFileBuffers
CreateProcessA
GetTempFileNameA
WideCharToMultiByte
SetStdHandle
FileTimeToLocalFileTime
DeleteCriticalSection
GetProcAddress
GetTempPathA
SetConsoleCtrlHandler
GetFileSize
GetFullPathNameA
Sleep
SetLastError
SetFilePointer
FindResourceA
CompareStringA
GetLastError
SetHandleCount
TlsSetValue
IsValidLocale
TlsFree
GetFileType
GetCurrentThreadId
GetCurrentDirectoryA
LCMapStringW
GetStringTypeA
ReadFile
GetTimeZoneInformation
CloseHandle
FindFirstFileA
GetComputerNameA
TerminateProcess
CreateThread
IsBadWritePtr
GetACP
lstrcpyA
GlobalUnlock
InterlockedIncrement
LoadResource
FreeEnvironmentStringsW
GetLocaleInfoW
TerminateThread
GetOEMCP
ExitProcess
MultiByteToWideChar
UnhandledExceptionFilter
GetCPInfo
FileTimeToSystemTime
HeapAlloc
lstrcatA
LeaveCriticalSection
SetCurrentDirectoryA
GetVersionExA
WinExec
SizeofResource
WriteFile
EnterCriticalSection
GetSystemDefaultLangID
VirtualFree
GetCurrentThread
GetDriveTypeA
GetStringTypeW
HeapDestroy
GetUserDefaultLCID
IsValidCodePage
VirtualAlloc
SetEnvironmentVariableA
DeleteFileA
GetEnvironmentStringsW
HeapReAlloc
TlsGetValue
HeapFree
InitializeCriticalSection
LCMapStringA
LoadLibraryA
GetVersion
CreateFileA
GlobalFree
GetStdHandle
FatalAppExitA
HeapCreate
GlobalHandle
GetFileAttributesA
GlobalLock
EnumSystemLocalesA
TlsAlloc
ResumeThread
gdi32
DeleteObject
GetStockObject
advapi32
RegQueryValueA
RegOpenKeyExA
RegFlushKey
RegCloseKey
RegSetValueExA
RegQueryValueExA
GetUserNameA
RegCreateKeyExA
user32
SetDlgItemTextA
ShowWindow
GetWindowRect
LoadIconA
FindWindowA
EnumWindowStationsA
GetSystemMetrics
GetDlgItemTextA
UnregisterClassA
GetClientRect
PostMessageA
SetWindowTextA
SetWindowPos
DialogBoxParamA
SendMessageA
LoadImageA
RegisterClassExA
DefWindowProcA
SetForegroundWindow
IsIconic
EnableWindow
SetClassLongA
MessageBoxA
EndDialog
PostQuitMessage
SetWindowsHookExA
UnhookWindowsHookEx
GetDlgItem
wininet
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
InternetConnectA
InternetCloseHandle
InternetOpenA
Sections
.text Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ