Static task
static1
Behavioral task
behavioral1
Sample
07a4be1b3cd83c4d93c03f8c4d94e749_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07a4be1b3cd83c4d93c03f8c4d94e749_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
07a4be1b3cd83c4d93c03f8c4d94e749_JaffaCakes118
-
Size
213KB
-
MD5
07a4be1b3cd83c4d93c03f8c4d94e749
-
SHA1
9f93eef1d76dc7fb81c1a27072fcdaba13ceecaa
-
SHA256
e9c27ff3571ffffae61e5d3ff656012852c6665f5b03460c725545fa0ec399cc
-
SHA512
8b6869d4d4e287f9694fa216d221c58b4c2cfcd9a95d26a3dc7f8f4abb57bf37b51909f25256a2956965c381a86911909a6c31c81112560009b25050cb7edee8
-
SSDEEP
3072:jj+5uXupwuv9QpxmqqnsZdysdJzTFyBfaFoNpOjYWQ6i0UX/poXP2Venq5+:j9Sv9QpintsdHef0YWnizX/poOU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07a4be1b3cd83c4d93c03f8c4d94e749_JaffaCakes118
Files
-
07a4be1b3cd83c4d93c03f8c4d94e749_JaffaCakes118.exe windows:4 windows x86 arch:x86
f52f9b2931b7fffa618f61746796e965
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
shlwapi
SHDeleteKeyA
kernel32
GetWindowsDirectoryA
lstrlenA
GetVersionExA
GetLastError
GetModuleFileNameA
CopyFileA
lstrcpyA
lstrcmpA
CreateFileA
ExitThread
ExitProcess
UnmapViewOfFile
GetSystemTime
MapViewOfFile
SetFileTime
GetFileTime
CreateFileMappingA
GetFileSize
SleepEx
CreateDirectoryA
RemoveDirectoryA
FindClose
Sleep
FindFirstFileA
SetEndOfFile
SetFilePointer
GetShortPathNameA
MoveFileExA
DeleteFileA
WriteFile
LocalFree
FormatMessageA
WideCharToMultiByte
GetModuleHandleA
SetCurrentDirectoryA
LocalAlloc
CreateProcessA
GetExitCodeThread
CreateThread
OpenProcess
HeapAlloc
GetProcessHeap
HeapFree
TerminateProcess
GetDiskFreeSpaceA
ResumeThread
SuspendThread
GetCurrentProcess
GetSystemDirectoryA
CreateMutexA
OpenMutexA
WaitForSingleObject
lstrcmpiA
ReleaseMutex
CloseHandle
LoadLibraryA
GetProcAddress
FreeLibrary
GetFileAttributesA
lstrcatA
MultiByteToWideChar
FindNextFileA
GetStartupInfoA
user32
MessageBoxA
wsprintfA
GetForegroundWindow
SendMessageA
SendDlgItemMessageA
EnableWindow
GetDlgItem
SetDlgItemTextA
PostQuitMessage
DispatchMessageA
TranslateMessage
SetWindowTextA
ShowWindow
LoadIconA
ExitWindowsEx
GetWindowLongA
SetWindowLongA
GetWindowRect
ScreenToClient
CreateWindowExA
CallWindowProcA
GetDlgItemTextA
DestroyWindow
DialogBoxParamA
CharUpperA
FindWindowA
CreateDialogParamA
EnumWindows
GetWindowThreadProcessId
GetWindowTextA
GetClientRect
SetWindowPos
GetMessageA
PostMessageA
advapi32
RegQueryValueExA
AdjustTokenPrivileges
OpenProcessToken
RegOpenKeyExA
RegEnumKeyA
RegQueryInfoKeyA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegEnumKeyExA
GetUserNameA
FreeSid
LookupPrivilegeValueA
shell32
SHBrowseForFolderA
SHGetMalloc
ShellExecuteExA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
SysAllocStringLen
SysFreeString
LoadTypeLibEx
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
sprintf
strtol
strcmp
strtoul
_itoa
memmove
strchr
strncpy
_ftol
memcpy
_splitpath
wcsstr
wcsncmp
wcscat
wcscpy
memset
free
malloc
memcmp
??2@YAPAXI@Z
??3@YAXPAX@Z
strstr
strrchr
strlen
strcat
strcpy
__CxxFrameHandler
_except_handler3
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ldata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE