Static task
static1
Behavioral task
behavioral1
Sample
09165fc24cfb3e2e18ef0f8ebec43ae7_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
09165fc24cfb3e2e18ef0f8ebec43ae7_JaffaCakes118
-
Size
120KB
-
MD5
09165fc24cfb3e2e18ef0f8ebec43ae7
-
SHA1
8b9b36b254624d504133341cf421368ba110fe1f
-
SHA256
a0a3b12fb11ced88f7e1dabe3418a890874190b67d39f364e128c33bcc10210a
-
SHA512
0f1b83b12dd07eac8066e3112eadd448621db7a9b49f907d05cfe453871ccc0971716747a98c2b16423f123f95b990848acd6767b9bef1fdfe3794ba831dfaed
-
SSDEEP
3072:G2Vv1g5JHTyjkqLZAwqqJcoBf/HlXQFWC:G2U5JHTy1AVcHVe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 09165fc24cfb3e2e18ef0f8ebec43ae7_JaffaCakes118
Files
-
09165fc24cfb3e2e18ef0f8ebec43ae7_JaffaCakes118.exe windows:4 windows x86 arch:x86
70f41855109fad1c83ee5372bcae09c7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQueryEx
GetEnvironmentStringsW
GetEnvironmentVariableA
ReadProcessMemory
WideCharToMultiByte
LoadLibraryA
GetCommandLineW
WaitForSingleObject
TerminateProcess
VerLanguageNameA
GlobalFree
GlobalLock
GlobalAlloc
SetPriorityClass
GetTimeFormatA
CreateFileMappingA
CreateFileA
FileTimeToLocalFileTime
GetFileTime
GetPriorityClass
GetModuleHandleA
GetProcAddress
GetCurrentProcess
CloseHandle
IsBadStringPtrA
lstrlenA
lstrcmpiA
lstrcmpA
GetCurrentProcessId
lstrcpyA
GetVersion
MultiByteToWideChar
MapViewOfFile
lstrcpynA
UnmapViewOfFile
GetLastError
OpenProcess
GetDateFormatA
FileTimeToSystemTime
GlobalUnlock
GetStringTypeA
LCMapStringA
WriteFile
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
SetStdHandle
GetStdHandle
SetHandleCount
SetFilePointer
ReadFile
SetEndOfFile
ExitProcess
GetCommandLineA
GetStartupInfoA
RtlUnwind
HeapReAlloc
HeapAlloc
HeapFree
GetStringTypeW
LCMapStringW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
FlushFileBuffers
GetCPInfo
GetModuleFileNameA
GetACP
GetOEMCP
DeleteFileA
GetFileType
user32
TranslateAcceleratorA
GetMenuItemInfoA
LoadMenuA
DispatchMessageA
GetDlgItemTextA
WinHelpA
GetMessageA
GetClassInfoA
LoadAcceleratorsA
TranslateMessage
EmptyClipboard
OpenClipboard
wsprintfA
SetClipboardData
GetWindowLongA
LoadStringA
FindWindowA
SendMessageA
SetDlgItemTextA
GetDesktopWindow
GetSystemMetrics
LoadImageA
LoadIconA
LoadCursorA
RegisterClassExA
RegisterClassA
CloseClipboard
EnableMenuItem
GetWindowTextA
GetIconInfo
GetClassLongA
GetKeyState
EndDialog
SetCapture
SetCursor
WindowFromPoint
GetMenu
PostMessageA
GetWindowThreadProcessId
CreateWindowExA
ShowWindow
UpdateWindow
DefFrameProcA
DefMDIChildProcA
DefDlgProcA
DefWindowProcA
GetWindowDC
PostQuitMessage
InsertMenuItemA
DeleteMenu
CheckMenuItem
MoveWindow
InvalidateRect
GetDlgItem
GetWindow
CharNextExA
MessageBoxA
KillTimer
SetTimer
GetWindowRect
ReleaseDC
SetWindowPos
SetWindowTextA
GetMenuStringA
GetSubMenu
GetCursorPos
SetForegroundWindow
TrackPopupMenu
GetClientRect
DestroyWindow
GetParent
DialogBoxParamA
gdi32
DeleteObject
LineTo
MoveToEx
SetROP2
SelectObject
GetStockObject
comdlg32
GetSaveFileNameA
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
shell32
Shell_NotifyIconA
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
ole32
CoUninitialize
CoCreateInstance
CoInitialize
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
comctl32
ord17
ImageList_Add
ImageList_Create
ImageList_Destroy
ord6
CreateToolbarEx
Sections
.text Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE