Static task
static1
Behavioral task
behavioral1
Sample
0322d121eae4bbac69f868ec33f927fc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0322d121eae4bbac69f868ec33f927fc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0322d121eae4bbac69f868ec33f927fc_JaffaCakes118
-
Size
246KB
-
MD5
0322d121eae4bbac69f868ec33f927fc
-
SHA1
dd6a8193b1865c80508192d1f063df87e9821d20
-
SHA256
c5848979c5baddbf110910c9e96d4ca747bb78af8e97a43747dd7126655d5426
-
SHA512
aa79f15faf398cdb7c04975618885fc476ce5681d77162870bee95fb776df497f33e9812a87bdf884dddf3e8a4f9f5163a4118cc13b2e87b79601b307429891f
-
SSDEEP
3072:y3ewHwdQRmrAb20C0VgaMbFxZF3TZpwCCL/s3iaARkOjK9gxez4j:/wUDrAb20C0VgvFUo3+rKyxe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0322d121eae4bbac69f868ec33f927fc_JaffaCakes118
Files
-
0322d121eae4bbac69f868ec33f927fc_JaffaCakes118.exe windows:4 windows x86 arch:x86
f0e377314c51cf161d6f44052df1dbcc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHFormatDrive
SheChangeDirExW
SHChangeNotify
SHAddToRecentDocs
DoEnvironmentSubstW
ExtractAssociatedIconExW
SHEmptyRecycleBinW
InternalExtractIconListA
RealShellExecuteW
ExtractIconA
SHBrowseForFolder
SHBrowseForFolderA
SHGetSettings
SHGetPathFromIDListA
ExtractIconW
ShellExecuteExW
SheSetCurDrive
SHLoadInProc
SHGetInstanceExplorer
ExtractIconExW
SHUpdateRecycleBinIcon
RealShellExecuteA
ShellExecuteExA
ShellAboutA
user32
LoadImageA
ExitWindowsEx
MonitorFromRect
InflateRect
DrawStateA
OemToCharA
BroadcastSystemMessageA
GetMenuItemID
IsCharLowerW
AttachThreadInput
MessageBoxW
GetDC
comdlg32
ReplaceTextA
ChooseColorW
GetOpenFileNameW
PageSetupDlgA
ChooseFontW
ChooseFontA
PrintDlgW
GetSaveFileNameW
GetFileTitleA
GetFileTitleW
GetOpenFileNameA
PrintDlgA
FindTextA
ReplaceTextW
PageSetupDlgW
FindTextW
LoadAlterBitmap
gdi32
GetEnhMetaFileBits
CreateFontIndirectA
GetPixelFormat
GetEnhMetaFileDescriptionW
GetGlyphOutline
UpdateICMRegKeyW
GdiPlayJournal
GetArcDirection
TranslateCharsetInfo
GetMetaFileBitsEx
GetGlyphOutlineA
SetTextColor
GetEnhMetaFileHeader
GetTextExtentPointA
GetPaletteEntries
DeleteDC
EndDoc
CreateSolidBrush
GetCharWidth32A
kernel32
WideCharToMultiByte
GetDateFormatA
HeapAlloc
DeleteCriticalSection
OpenMutexA
EnumSystemLocalesA
GetTickCount
CompareStringW
HeapFree
GetLocaleInfoW
InterlockedIncrement
FreeEnvironmentStringsW
HeapSize
UnhandledExceptionFilter
QueryPerformanceCounter
TlsAlloc
OpenFileMappingW
GetStringTypeW
FreeLibrary
GetModuleFileNameW
TlsFree
GetCurrentProcessId
RtlUnwind
GetCommandLineW
OutputDebugStringA
InterlockedDecrement
EnterCriticalSection
IsValidCodePage
LCMapStringA
GetTimeFormatA
TlsGetValue
ExitProcess
TerminateProcess
GetProcessHeap
VirtualQuery
GetModuleHandleA
GetStartupInfoW
HeapDestroy
SetLastError
GetStringTypeA
SetUnhandledExceptionFilter
CreateProcessA
WriteFile
GetEnvironmentStringsW
SetEnvironmentVariableA
InterlockedExchange
GetEnvironmentStrings
MultiByteToWideChar
GetCPInfo
LCMapStringW
Sleep
GetTimeZoneInformation
GetUserDefaultLCID
GetProcAddress
GetLastError
VirtualAlloc
GetModuleFileNameA
GetStartupInfoA
InitializeCriticalSection
CreateMutexW
CompareStringA
GetOEMCP
GetACP
HeapReAlloc
GetCommandLineA
HeapCreate
SuspendThread
GetVersionExA
GetCurrentProcess
SetConsoleCtrlHandler
TlsSetValue
SetWaitableTimer
IsDebuggerPresent
GetFileType
VirtualFree
IsValidLocale
lstrcmpiA
GetLocaleInfoA
GetStdHandle
LeaveCriticalSection
GetCurrentThread
FreeEnvironmentStringsA
GetCurrentThreadId
SetHandleCount
LoadLibraryA
GetSystemTimeAsFileTime
Sections
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 113KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ