Static task
static1
Behavioral task
behavioral1
Sample
0103012210ab92a2566379c114d50334_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0103012210ab92a2566379c114d50334_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0103012210ab92a2566379c114d50334_JaffaCakes118
-
Size
29KB
-
MD5
0103012210ab92a2566379c114d50334
-
SHA1
47ffddaa80077816ffe62feb762af25f3567a701
-
SHA256
72d142c868249d8ef9eaf71de191c83794d2198a2e76eb73b40e0a8f33981510
-
SHA512
d92001813e1d348208e486ae646676143333e83ad009d924f30a8f5ce94061f2452f1837f9b6fe76a74bd2d0a98ccd6881fef513331ddf3b1429e566d1a23a32
-
SSDEEP
768:zBixMzuN2i/ftrPghEvFFWFu0/qLS0sCH8SP:zBixMzut/lrYhEvFFzs0XP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0103012210ab92a2566379c114d50334_JaffaCakes118
Files
-
0103012210ab92a2566379c114d50334_JaffaCakes118.exe windows:4 windows x86 arch:x86
49c3dbf15bb51b57404183261747611d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
CreateProcessA
ExitProcess
lstrcpyA
RemoveDirectoryA
VirtualFree
CloseHandle
VirtualAlloc
CompareStringA
WritePrivateProfileStringA
FindNextFileA
GetCurrentDirectoryA
GetFullPathNameA
lstrcmpA
FindClose
GetPrivateProfileStringA
GetPrivateProfileIntA
MoveFileExA
CopyFileA
FreeLibrary
GetProcAddress
LoadLibraryA
ReadFile
SetFilePointer
GetFileSize
CreateFileA
GetTempPathA
GetWindowsDirectoryA
GetModuleFileNameA
InterlockedIncrement
FindFirstFileA
SetCurrentDirectoryA
lstrcpynA
lstrcatA
DeleteFileA
SetFileAttributesA
SetStdHandle
GetLastError
HeapAlloc
GetStringTypeW
GetStringTypeA
FlushFileBuffers
lstrlenA
GetModuleHandleA
HeapFree
WriteFile
HeapCreate
GetStdHandle
GetFileType
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
MultiByteToWideChar
FreeEnvironmentStringsA
GetVersion
GetCommandLineA
UnhandledExceptionFilter
GetStartupInfoA
RtlUnwind
user32
DdeUninitialize
DdeInitializeA
SendDlgItemMessageA
DdeDisconnect
DdeFreeStringHandle
DdeFreeDataHandle
DialogBoxParamA
FindWindowA
EndDialog
ShowWindow
GetWindowLongA
LoadIconA
SetClassLongA
SetWindowTextA
GetWindowRect
SetWindowPos
SetDlgItemTextA
PostMessageA
GetDlgItem
DdeCreateDataHandle
DdeCreateStringHandleA
DdeConnect
wsprintfA
DdeClientTransaction
MessageBoxA
CharLowerA
EnableWindow
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 113B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Shared Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.yvs Size: - Virtual size: 1B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE