Static task
static1
Behavioral task
behavioral1
Sample
083932ce87b5df1ce64c65f17d5f1bc0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
083932ce87b5df1ce64c65f17d5f1bc0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
083932ce87b5df1ce64c65f17d5f1bc0_JaffaCakes118
-
Size
79KB
-
MD5
083932ce87b5df1ce64c65f17d5f1bc0
-
SHA1
acf5def87c5b97b4f2ba3df3b4d7f95c3154b70f
-
SHA256
a0d4599882396a02dd80c2ec415b7ce6b9fd387156f6f0dc2399a0b067be0441
-
SHA512
b403eba217d8b38ce9c8f31c04ba77a60234a25da356cd193625665daa554ebb8a0850442fce9e8b1223831829ded3793021c896823e581edd5fcbb30532886a
-
SSDEEP
1536:cJLDi8XAVNSwyow4JXauAabfnJkSLYuantERJv5AEt8:cxDi8QVUhdMKIfJLvatE/v5f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 083932ce87b5df1ce64c65f17d5f1bc0_JaffaCakes118
Files
-
083932ce87b5df1ce64c65f17d5f1bc0_JaffaCakes118.exe windows:5 windows x86 arch:x86
c3950b60359f7e8a342d402727bbd52f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpynA
lstrlenA
lstrcpyA
CreateFileW
lstrcmpA
lstrcatA
_lread
_lopen
_llseek
_lclose
_hread
WritePrivateProfileStringA
WinExec
UnhandledExceptionFilter
TerminateProcess
Sleep
SizeofResource
SetUnhandledExceptionFilter
SetThreadPriority
QueryPerformanceCounter
OpenFile
LockResource
LocalFree
LocalAlloc
LoadResource
LoadLibraryA
GlobalUnlock
GlobalReAlloc
GlobalLock
GlobalHandle
GlobalFree
GlobalAlloc
GetVersion
GetTickCount
GetSystemTimeAsFileTime
GetStartupInfoA
FindResourceA
GetProcAddress
GetPrivateProfileIntA
GetModuleHandleA
GetModuleFileNameA
GetLastError
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
FreeResource
VirtualAlloc
user32
RegisterClassA
RegisterWindowMessageA
ReleaseCapture
ReleaseDC
SendDlgItemMessageA
SendMessageA
SetCapture
SetCursor
SetCursorPos
SetFocus
SetForegroundWindow
SetMenu
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
TranslateMessage
UnregisterClassA
UpdateWindow
WinHelpA
wsprintfA
PostMessageA
PeekMessageA
MoveWindow
MessageBoxA
MessageBeep
MapVirtualKeyA
LoadStringA
LoadIconA
LoadCursorA
RedrawWindow
IsWindowVisible
InvalidateRect
GetWindowTextA
GetWindowRect
GetWindowLongA
GetSystemMetrics
GetParent
GetMessageA
GetMenu
GetKeyNameTextA
GetDlgItemTextA
GetDlgItem
GetDesktopWindow
GetDC
GetCursorPos
FindWindowA
FillRect
EndPaint
EndDialog
EnableWindow
EnableMenuItem
DrawTextA
DrawMenuBar
DispatchMessageA
DialogBoxParamA
DialogBoxIndirectParamA
DestroyWindow
DeleteMenu
DefWindowProcA
CreateWindowExA
CheckMenuItem
ChangeDisplaySettingsA
LoadBitmapA
PostQuitMessage
BeginPaint
IsIconic
gdi32
SetLayout
SetPaletteEntries
SetBkMode
SetTextColor
StretchDIBits
SelectPalette
SelectObject
ResizePalette
RealizePalette
GetSystemPaletteEntries
GetStockObject
GetPaletteEntries
GetObjectA
GetLayout
GetDeviceCaps
DeleteObject
DeleteDC
CreateSolidBrush
CreatePalette
CreateDIBitmap
CreateCompatibleDC
CreateCompatibleBitmap
SetSystemPaletteUse
BitBlt
advapi32
OpenProcessToken
RegOpenKeyExA
RegSaveKeyW
RegRestoreKeyW
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueW
GetTokenInformation
FreeSid
EqualSid
DuplicateTokenEx
CreateProcessAsUserW
AllocateAndInitializeSid
shell32
ShellAboutA
comctl32
InitCommonControlsEx
msvcrt
_XcptFilter
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
exit
free
malloc
towlower
wcschr
wcslen
wcstoul
Sections
.text2 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37.6MB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ