Static task
static1
Behavioral task
behavioral1
Sample
0837e8bafab8697aa9d893a62db1c84b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0837e8bafab8697aa9d893a62db1c84b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0837e8bafab8697aa9d893a62db1c84b_JaffaCakes118
-
Size
109KB
-
MD5
0837e8bafab8697aa9d893a62db1c84b
-
SHA1
cd4923206d42f8263450edb5a2845fbcfc37319f
-
SHA256
b35f434659501c13c52de7b52fe5a5347bd4d89d131a0ef6ae1db861623b1fd7
-
SHA512
ad5051cdc7b1b945ba7bb1f64d63a06e4a1afd9c1e952f888b26e38fd92d95e5bfbcc647b301eebef9c65d5019e2cf51712380e63282585030ef7d6e9f0202d4
-
SSDEEP
3072:wtkRac5wZ+hNy3xCXkpbrQWvNfEYrBZCHQ:KQjwwhENFvuYrBoQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0837e8bafab8697aa9d893a62db1c84b_JaffaCakes118
Files
-
0837e8bafab8697aa9d893a62db1c84b_JaffaCakes118.exe windows:4 windows x86 arch:x86
f49732358a146810f30cc6f619f28419
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
FindClose
FindFirstFileA
GetTempPathA
GetVersionExA
FreeLibrary
LoadLibraryA
CloseHandle
WriteFile
CreateFileA
SizeofResource
LockResource
LoadResource
FindResourceA
GetShortPathNameA
lstrcmpiA
CopyFileA
lstrlenA
Sleep
GetTickCount
GetModuleFileNameA
GetFileAttributesA
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
lstrcpynA
FileTimeToSystemTime
CreateDirectoryA
GetWindowsDirectoryA
OpenProcess
RemoveDirectoryA
ResumeThread
SetPriorityClass
GetCurrentProcess
GetCurrentThread
SetThreadPriority
CreateProcessA
GetTempFileNameA
HeapAlloc
GetSystemInfo
HeapCreate
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
SystemTimeToFileTime
FlushInstructionCache
GetModuleHandleA
GetStartupInfoA
ExitProcess
GetCommandLineA
HeapFree
lstrcpyA
lstrcatA
EnumResourceNamesA
DeleteFileA
GetLocalTime
WaitForSingleObject
TerminateProcess
GetCurrentThreadId
GetProcAddress
RaiseException
InterlockedExchange
LocalAlloc
user32
IsWindow
wsprintfA
GetWindowLongA
PostQuitMessage
FindWindowA
SendMessageTimeoutA
DefWindowProcA
CallWindowProcA
DestroyWindow
GetWindowThreadProcessId
GetClassInfoExA
SetWindowLongA
CharNextA
CreateWindowExA
LoadCursorA
RegisterClassExA
GetSystemMetrics
advapi32
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegQueryInfoKeyA
RegOpenKeyExA
shell32
SHGetMalloc
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ole32
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
VarR8FromStr
VarI4FromStr
VarBstrFromI4
SysFreeString
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 179KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ