Static task
static1
Behavioral task
behavioral1
Sample
01466852a989506cecf7dd1640ee303b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01466852a989506cecf7dd1640ee303b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
01466852a989506cecf7dd1640ee303b_JaffaCakes118
-
Size
237KB
-
MD5
01466852a989506cecf7dd1640ee303b
-
SHA1
b74a0c605e857ad4a133eeffebc00ecff8f772b5
-
SHA256
19d78b3d952f3a68c6ec6d71c5a219527340c006065abfbb04327f85cc4bc7ed
-
SHA512
7f82d659f6722a7e166daf6edfc5e3ce6ea50248bf75d4047a84391da51c2eb10b48a1a01b51c58f3becdac4e3f7638b594f704e417659888f220696cb9bc3e6
-
SSDEEP
6144:2UbYrA82ob4ZjH/nwIyvl6lv7yRHGo7FNU99S2J+3J6u:2UbYc82ob4Zhy96lv7UGo7SNJ6Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01466852a989506cecf7dd1640ee303b_JaffaCakes118
Files
-
01466852a989506cecf7dd1640ee303b_JaffaCakes118.exe windows:4 windows x86 arch:x86
1aff1467f63e4e6df02577ca1da4a9fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetBkMode
CloseFigure
SetRectRgn
RestoreDC
SetArcDirection
DeviceCapabilitiesExA
FrameRgn
EndPath
RoundRect
GetGlyphOutlineW
GetTextExtentExPointA
GetEnhMetaFileBits
CreateCompatibleBitmap
PlayEnhMetaFileRecord
GetClipRgn
CreateDCA
advapi32
AbortSystemShutdownW
ReportEventW
RegEnumValueW
RegConnectRegistryW
CryptEnumProviderTypesA
CryptSignHashA
CryptGenRandom
LookupSecurityDescriptorPartsA
RegReplaceKeyW
StartServiceW
CryptSetProviderW
CryptDuplicateKey
RegQueryValueA
CryptHashData
CryptSetProviderA
CryptContextAddRef
LookupAccountNameA
RegRestoreKeyW
LogonUserW
CryptAcquireContextW
RegQueryInfoKeyW
user32
SetMenuItemInfoW
SetPropW
CallNextHookEx
SubtractRect
ChildWindowFromPoint
EnumDesktopsA
PaintDesktop
IsCharUpperW
EnumPropsExA
GetDoubleClickTime
CascadeWindows
GetScrollBarInfo
CharNextW
CharUpperBuffW
GetWindowLongA
CreateMDIWindowW
LoadImageA
CreateIconFromResourceEx
MonitorFromRect
comdlg32
ChooseColorW
PageSetupDlgA
ChooseColorA
PrintDlgA
PrintDlgW
LoadAlterBitmap
GetSaveFileNameA
GetOpenFileNameW
PageSetupDlgW
GetFileTitleW
kernel32
GetModuleHandleA
GetVersion
SetPriorityClass
TlsAlloc
TerminateProcess
TlsSetValue
ExpandEnvironmentStringsW
ExitProcess
CreateFileA
InitializeCriticalSection
HeapDestroy
GetCurrentProcessId
WaitForSingleObjectEx
GetWindowsDirectoryW
OpenSemaphoreA
RaiseException
GetTickCount
GetPrivateProfileSectionA
OpenFileMappingW
FreeLibraryAndExitThread
EnterCriticalSection
VirtualFree
GetProcAddress
GetStartupInfoA
DeleteFiber
RtlUnwind
HeapReAlloc
GetEnvironmentStringsW
FreeEnvironmentStringsA
GetEnvironmentStrings
LeaveCriticalSection
WaitForDebugEvent
UnhandledExceptionFilter
DeleteCriticalSection
GetStdHandle
SetHandleCount
GetStartupInfoW
GetModuleFileNameW
HeapFree
LocalSize
IsBadWritePtr
WriteFile
GetModuleFileNameA
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
CreateMailslotW
HeapCreate
TlsGetValue
VirtualAlloc
GetCommandLineA
GetLogicalDriveStringsA
GetCurrentThreadId
GetConsoleTitleA
CloseHandle
GetLastError
HeapAlloc
GetFileType
SetLastError
GetCommandLineW
MultiByteToWideChar
GetCurrentThread
LoadLibraryA
TlsFree
VirtualQuery
InterlockedExchange
QueryPerformanceCounter
GetCurrentProcess
Sections
.text Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ