Static task
static1
Behavioral task
behavioral1
Sample
03ee0e7b98966250151d633210e63fad_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03ee0e7b98966250151d633210e63fad_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
03ee0e7b98966250151d633210e63fad_JaffaCakes118
-
Size
30KB
-
MD5
03ee0e7b98966250151d633210e63fad
-
SHA1
d7a60f0e835c2ac002095707af1d406d2515bdad
-
SHA256
b9016ac7b320c3f82d99d30fe1cfea89e1f9bb669232d41e465a15b97aa8629f
-
SHA512
d1520e5cbe7d0287c095fbad3e50a01172bd213f1241f3c401301a84a98bde14fd44954caa3a0ae3cb420114760050cd29973d373c66ad01435eb6c5d508ea11
-
SSDEEP
384:F02egeszkcKv8ohyBConR4gxH5OCg1eAXm+9xDH/+rLS0pCmVHi:ssrohyrnegnOJeAW+fD/qLS0A0Hi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03ee0e7b98966250151d633210e63fad_JaffaCakes118
Files
-
03ee0e7b98966250151d633210e63fad_JaffaCakes118.exe windows:4 windows x86 arch:x86
6bd32a3acdb7646039ca92216b17bbb8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
CreateProcessA
ExitProcess
lstrcpyA
RemoveDirectoryA
VirtualFree
CloseHandle
lstrcmpA
VirtualAlloc
CompareStringA
WritePrivateProfileStringA
FindNextFileA
GetCurrentDirectoryA
GetFullPathNameA
FindClose
GetPrivateProfileStringA
GetPrivateProfileIntA
MoveFileExA
CopyFileA
FreeLibrary
GetProcAddress
LoadLibraryA
ReadFile
SetFilePointer
GetFileSize
CreateFileA
GetTempPathA
GetWindowsDirectoryA
GetModuleFileNameA
InterlockedIncrement
FindFirstFileA
SetCurrentDirectoryA
lstrcpynA
lstrcatA
DeleteFileA
SetFileAttributesA
SetStdHandle
GetLastError
HeapAlloc
GetStringTypeW
GetStringTypeA
FlushFileBuffers
lstrlenA
GetModuleHandleA
HeapFree
WriteFile
HeapCreate
GetStdHandle
GetFileType
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
MultiByteToWideChar
FreeEnvironmentStringsA
GetVersion
GetCommandLineA
UnhandledExceptionFilter
GetStartupInfoA
RtlUnwind
user32
DdeUninitialize
DdeInitializeA
SendDlgItemMessageA
DdeDisconnect
DdeFreeStringHandle
DdeFreeDataHandle
DialogBoxParamA
FindWindowA
EndDialog
ShowWindow
GetWindowLongA
LoadIconA
SetClassLongA
SetWindowTextA
GetWindowRect
SetWindowPos
SetDlgItemTextA
PostMessageA
GetDlgItem
DdeCreateDataHandle
DdeCreateStringHandleA
DdeConnect
wsprintfA
DdeClientTransaction
MessageBoxA
CharLowerA
EnableWindow
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 113B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Shared Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.uro Size: - Virtual size: 1B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE