Static task
static1
Behavioral task
behavioral1
Sample
0839ae69fcecece146aa13b0905fb061_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0839ae69fcecece146aa13b0905fb061_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
0839ae69fcecece146aa13b0905fb061_JaffaCakes118
-
Size
180KB
-
MD5
0839ae69fcecece146aa13b0905fb061
-
SHA1
5a404c4b39549d68981151ad27d0ba4c2ab2a5ae
-
SHA256
f9101007c0163f9741b23b6e24f4fa96cb0014a3e1e3814922d3c1be5def6f86
-
SHA512
d784bd9d129527193875d882afe32ea9534690c1495c41a505a9b678fdd946f2be64a6572267c268b80f62d6fed136dc417a6edb73c9f51792dd83da9a434cba
-
SSDEEP
3072:Z1Ke7oQCGJRWPp7w8gC89/JXds/K1VhDczGH89BGHR6//zbPgnL62M63j:ZcGLaPi/9+ejPc9BIU//YnL62xj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0839ae69fcecece146aa13b0905fb061_JaffaCakes118
Files
-
0839ae69fcecece146aa13b0905fb061_JaffaCakes118.exe windows:4 windows x86 arch:x86
687c0be661bafa5f819b8d10cc170a7e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileSize
VirtualFree
GetProcAddress
GetUserDefaultLCID
GetStartupInfoA
DeleteCriticalSection
lstrcpynA
GetLastError
GetTickCount
GetProcessHeap
ReadFile
VirtualAllocEx
lstrcatA
MoveFileA
GetStringTypeW
GetCommandLineA
SetThreadLocale
SetEvent
GetModuleHandleA
DeleteFileA
FindFirstFileA
HeapFree
FreeLibrary
MulDiv
FindResourceA
GetCPInfo
GetSystemDefaultLangID
SetHandleCount
GlobalAlloc
VirtualAlloc
GlobalAddAtomA
lstrlenA
MoveFileExA
EnterCriticalSection
GetModuleFileNameA
GetStdHandle
FindClose
GetLocaleInfoA
SetErrorMode
GetACP
LoadLibraryExA
GetVersionExA
GetVersion
GetCurrentThreadId
GetDateFormatA
GetDiskFreeSpaceA
HeapAlloc
SetFilePointer
WriteFile
lstrcpyA
LocalAlloc
Sleep
GlobalFindAtomA
GetEnvironmentStrings
LoadResource
LoadLibraryA
HeapDestroy
SizeofResource
GetCurrentProcess
LocalFree
RaiseException
GetFullPathNameA
WideCharToMultiByte
ExitThread
GetOEMCP
CreateFileA
ExitProcess
SetEndOfFile
user32
CallWindowProcA
GetDesktopWindow
CharNextA
CharLowerA
SetWindowLongA
BeginPaint
CreateIcon
GetLastActivePopup
GetClipboardData
DrawIcon
GetCursor
SetWindowPos
GetCapture
ClientToScreen
GetKeyState
DrawTextA
GetForegroundWindow
EndPaint
EqualRect
EnumChildWindows
CharToOemA
DefMDIChildProcA
DefFrameProcA
EnableMenuItem
GetDC
GetClassInfoA
GetWindow
GetActiveWindow
SetTimer
MessageBoxA
EnableScrollBar
GetSubMenu
DrawMenuBar
EnumWindows
GetMenuItemCount
DrawIconEx
GetDlgItem
FillRect
CharLowerBuffA
GetMenuState
EnableWindow
IsWindowEnabled
CheckMenuItem
ShowScrollBar
GetMessagePos
SetCursor
TrackPopupMenu
GetCursorPos
GetPropA
FrameRect
GetSysColorBrush
FindWindowA
IsChild
GetScrollPos
DeferWindowPos
DrawFrameControl
HideCaret
SystemParametersInfoA
GetFocus
GetSysColor
GetParent
RegisterClassA
EndDeferWindowPos
GetClientRect
DrawEdge
EnumThreadWindows
GetKeyNameTextA
GetScrollInfo
IsMenu
ShowWindow
shell32
DragQueryFileA
SHGetFolderPathA
Shell_NotifyIconA
SHGetFileInfoA
msvcrt
sin
log10
memmove
memcpy
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 4KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 118KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE