Static task
static1
Behavioral task
behavioral1
Sample
05c3b1d8d23ad8643c891a435f60acdc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
05c3b1d8d23ad8643c891a435f60acdc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
05c3b1d8d23ad8643c891a435f60acdc_JaffaCakes118
-
Size
180KB
-
MD5
05c3b1d8d23ad8643c891a435f60acdc
-
SHA1
00d9bb2e9aea865da8a4fbe985de54d687d01af4
-
SHA256
fc39bfa432daf122e9a35e156a1bffc01d8ea2a5e261580a13a96ac83b2d67b6
-
SHA512
2315094bd494c76875fee5ca03cddffd999cf387d18ecf7f38fbed4f8d026e40ce38e25a414e8f809acf8d9f36fb746b3c8f3f8d84bc9f45b42d88d65cc466e9
-
SSDEEP
3072:ZKZWw/BKwd/yFMhx9aL41nnl/1/dvZJ/lMsyGzKF:ZyWw/swUFv81z/ZX9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 05c3b1d8d23ad8643c891a435f60acdc_JaffaCakes118
Files
-
05c3b1d8d23ad8643c891a435f60acdc_JaffaCakes118.exe windows:4 windows x86 arch:x86
fa63f8a1b373425d5ca3eac59859f047
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_DrawEx
ImageList_Draw
ImageList_GetBkColor
ImageList_Destroy
ImageList_Read
ImageList_Add
ImageList_Create
ImageList_Write
ImageList_Read
ImageList_Write
ImageList_Draw
ImageList_Destroy
ImageList_Remove
shell32
DragQueryFileA
SHGetFileInfoA
SHGetSpecialFolderLocation
version
GetFileVersionInfoA
VerInstallFileA
comdlg32
ChooseColorA
FindTextA
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
ChooseColorA
GetSaveFileNameA
FindTextA
GetOpenFileNameA
user32
GetKeyNameTextA
GetIconInfo
GetKeyState
shlwapi
SHDeleteKeyA
SHStrDupA
SHQueryInfoKeyA
SHQueryValueExA
PathIsContentTypeA
SHSetValueA
SHDeleteValueA
SHEnumValueA
PathIsDirectoryA
oleaut32
SysStringLen
SafeArrayUnaccessData
VariantChangeType
SysFreeString
SysAllocStringLen
SysReAllocStringLen
GetErrorInfo
SafeArrayGetElement
SafeArrayCreate
kernel32
ResetEvent
LoadLibraryExA
IsBadReadPtr
GlobalAlloc
LocalAlloc
VirtualAlloc
GetVersionExA
GetProcAddress
ExitProcess
ExitThread
ReadFile
GetModuleHandleA
SetEndOfFile
msvcrt
memcmp
ole32
CoUninitialize
CoFreeUnusedLibraries
GetHGlobalFromStream
ReleaseStgMedium
CoCreateInstanceEx
CoRevokeClassObject
CreateOleAdviseHolder
CoUnmarshalInterface
advapi32
RegDeleteValueA
RegCreateKeyExA
gdi32
CreateDIBSection
CreatePalette
GetRgnBox
SaveDC
GetDIBits
BitBlt
CreateFontIndirectA
SelectObject
CreatePenIndirect
GetDIBColorTable
Sections
CODE Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 535B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bdata Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 996B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ