Static task
static1
Behavioral task
behavioral1
Sample
04f16723af54a19aab1bba7218c31fa6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04f16723af54a19aab1bba7218c31fa6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
04f16723af54a19aab1bba7218c31fa6_JaffaCakes118
-
Size
29KB
-
MD5
04f16723af54a19aab1bba7218c31fa6
-
SHA1
f17b33bdec60421df6028e61d1f90f550377ff33
-
SHA256
7f437dddb1e5aa35a83d605b7788d8502583ecd99bae99c966dd2486288d4a67
-
SHA512
41ff8a5fa855d0b0e1a89313392f8cb39ddaa8af261f2c6f7817e3da3a3d5234ce1d65a5797c3f705e22843dca9db87f555da5a1856c1c5f0e1aea9709f288ee
-
SSDEEP
384:a02egeszkcKv8ohyBConR4gxH5OCg1eAXm+9xDH/+rLS0pCmVHz:zsrohyrnegnOJeAW+fD/qLS0A0Hz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04f16723af54a19aab1bba7218c31fa6_JaffaCakes118
Files
-
04f16723af54a19aab1bba7218c31fa6_JaffaCakes118.exe windows:4 windows x86 arch:x86
6bd32a3acdb7646039ca92216b17bbb8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
CreateProcessA
ExitProcess
lstrcpyA
RemoveDirectoryA
VirtualFree
CloseHandle
lstrcmpA
VirtualAlloc
CompareStringA
WritePrivateProfileStringA
FindNextFileA
GetCurrentDirectoryA
GetFullPathNameA
FindClose
GetPrivateProfileStringA
GetPrivateProfileIntA
MoveFileExA
CopyFileA
FreeLibrary
GetProcAddress
LoadLibraryA
ReadFile
SetFilePointer
GetFileSize
CreateFileA
GetTempPathA
GetWindowsDirectoryA
GetModuleFileNameA
InterlockedIncrement
FindFirstFileA
SetCurrentDirectoryA
lstrcpynA
lstrcatA
DeleteFileA
SetFileAttributesA
SetStdHandle
GetLastError
HeapAlloc
GetStringTypeW
GetStringTypeA
FlushFileBuffers
lstrlenA
GetModuleHandleA
HeapFree
WriteFile
HeapCreate
GetStdHandle
GetFileType
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
MultiByteToWideChar
FreeEnvironmentStringsA
GetVersion
GetCommandLineA
UnhandledExceptionFilter
GetStartupInfoA
RtlUnwind
user32
DdeUninitialize
DdeInitializeA
SendDlgItemMessageA
DdeDisconnect
DdeFreeStringHandle
DdeFreeDataHandle
DialogBoxParamA
FindWindowA
EndDialog
ShowWindow
GetWindowLongA
LoadIconA
SetClassLongA
SetWindowTextA
GetWindowRect
SetWindowPos
SetDlgItemTextA
PostMessageA
GetDlgItem
DdeCreateDataHandle
DdeCreateStringHandleA
DdeConnect
wsprintfA
DdeClientTransaction
MessageBoxA
CharLowerA
EnableWindow
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 113B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Shared Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ