Static task
static1
Behavioral task
behavioral1
Sample
0421951cdd2a5572e187ce404ee9c95f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0421951cdd2a5572e187ce404ee9c95f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0421951cdd2a5572e187ce404ee9c95f_JaffaCakes118
-
Size
332KB
-
MD5
0421951cdd2a5572e187ce404ee9c95f
-
SHA1
6c4ba494469912e1984412fdb4645bd6b5247bb2
-
SHA256
e6a3539667f5d335e96eeaed9660f7da8f298eba67cb1d5b5cd13f9b7aec993e
-
SHA512
d029cab41b6d419e22859ab23911769f23af97ee62a792be783ba78f32282f0b022ffc8be4d6ce08189966246846de1599ae57023d2113c5c00072374e1d4dd3
-
SSDEEP
6144:/bAx+b7M38n9NIdTX/rCONJqteM6eq6KYbhhze4Q0YPAdlh2DTHkSf+AJgjMc:/bAgn9N6PdLqIDeq6KQhqunh2DTESPs7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0421951cdd2a5572e187ce404ee9c95f_JaffaCakes118
Files
-
0421951cdd2a5572e187ce404ee9c95f_JaffaCakes118.exe windows:4 windows x86 arch:x86
bd11d731b070c3bdde73129fedff854d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
shell32
ShellExecuteA
SHBrowseForFolderA
SHFileOperationA
SHGetFileInfoA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
urlmon
RegisterBindStatusCallback
CoInternetCreateSecurityManager
CreateURLMonikerEx
comctl32
ImageList_Create
ImageList_Destroy
ImageList_AddMasked
ole32
OleInitialize
OleUninitialize
CoCreateInstance
CoTaskMemFree
advapi32
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegEnumValueA
RegSetValueExA
RegEnumKeyA
RegQueryValueExA
oleacc
CreateStdAccessibleObject
LresultFromObject
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
user32
SetTimer
SendMessageA
GetDC
LoadCursorA
wsprintfA
PostQuitMessage
DispatchMessageA
AppendMenuA
IsWindowEnabled
SetDlgItemTextA
SetClassLongA
SetWindowLongA
GetWindowRect
DestroyWindow
ScreenToClient
CreateDialogParamA
OpenClipboard
ShowWindow
InvalidateRect
CloseClipboard
EnableMenuItem
GetClientRect
CallWindowProcA
TrackPopupMenu
CharPrevA
PeekMessageA
EnableWindow
GetSysColor
SetClipboardData
EnumWindowStationsW
SendMessageTimeoutA
DialogBoxParamA
LoadBitmapA
FindWindowExA
ExitWindowsEx
GetWindowLongA
DefWindowProcA
CreateWindowExA
SetWindowTextA
GetSystemMenu
DrawTextA
EmptyClipboard
RegisterClassA
SetWindowPos
CreatePopupMenu
SetForegroundWindow
IsWindow
MessageBoxIndirectA
BeginPaint
CheckDlgButton
GetSystemMetrics
IsWindowVisible
GetDlgItemTextA
CharNextA
EndPaint
GetDlgItem
LoadImageA
GetClassInfoA
SetCursor
SystemParametersInfoA
FillRect
GetMessagePos
EndDialog
shlwapi
PathFindFileNameA
PathFindExtensionA
kernel32
LoadLibraryA
GetProcAddress
FreeLibrary
SetErrorMode
FindFirstFileA
GlobalFree
GlobalAlloc
GetPrivateProfileStringA
WritePrivateProfileStringA
lstrcmpiA
GetProcessAffinityMask
GetVersion
SetFilePointer
GetFileAttributesA
RemoveDirectoryA
GetExitCodeProcess
lstrcmpA
GetSystemDirectoryA
GlobalLock
GetFileSize
GetCommandLineA
WaitForSingleObject
GetCommProperties
DeleteFileA
CopyFileA
GetTempFileNameA
CreateProcessA
CreateThread
Sleep
FindNextFileA
GetWindowsDirectoryA
SetCurrentDirectoryA
ExitProcess
CreateDirectoryA
GetDiskFreeSpaceA
GetTempPathA
CreateFileA
LoadLibraryExA
ReadFile
GetShortPathNameA
GetTickCount
ExpandEnvironmentStringsA
MulDiv
SetFileTime
CloseHandle
GetFullPathNameA
WriteFile
SetFileAttributesA
MoveFileA
MultiByteToWideChar
lstrcpynA
GlobalUnlock
SearchPathA
GetLastError
GetModuleFileNameA
lstrlenA
FindClose
lstrcatA
GetCurrentProcess
GetModuleHandleA
CompareFileTime
gdi32
CreateBrushIndirect
SetTextColor
GetDeviceCaps
SelectObject
SetBkMode
DeleteObject
CreateFontIndirectA
SetBkColor
Sections
.text Size: 197KB - Virtual size: 197KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 5KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ