Static task
static1
Behavioral task
behavioral1
Sample
0a73722f9d54bd18fdc4f6bc366a62f7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0a73722f9d54bd18fdc4f6bc366a62f7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0a73722f9d54bd18fdc4f6bc366a62f7_JaffaCakes118
-
Size
68KB
-
MD5
0a73722f9d54bd18fdc4f6bc366a62f7
-
SHA1
3d1b71db50188cabc921019f5a8d0efa1bb71965
-
SHA256
b9871183cca82572c7378ba7a7db0c43725d6c3447d5f7648dadf6d233cc745c
-
SHA512
00b3631fbe2eaea868ac855fb0df81b64ffe5e2b3a2b426382fe6d570e6e441ae8f2140ead0660ef5f9cd3f3d70eefa05cae750c7fd0edd887ec86b232d77cf3
-
SSDEEP
1536:0songUqpmVH3Y9D/Uhy1jjxa6jKTvFPhwMl0aCdwAzgPVXopC:0Ap83Y9D/Uhy1j1a6jKDxNOdpg9KC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a73722f9d54bd18fdc4f6bc366a62f7_JaffaCakes118
Files
-
0a73722f9d54bd18fdc4f6bc366a62f7_JaffaCakes118.exe windows:4 windows x86 arch:x86
db16bb2699764b5dfbda41f7f2ed8c45
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ddraw
DirectDrawCreateEx
DirectDrawCreate
user32
TranslateMessage
DispatchMessageW
GetSysColorBrush
MessageBeep
GetNextDlgGroupItem
CreateWindowExW
InvalidateRgn
PostMessageW
UpdateWindow
SetTimer
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
EnableWindow
PostQuitMessage
SetWindowPos
MapDialogRect
GetParent
SetWindowContextHelpId
GetWindow
EndDialog
GetNextDlgTabItem
IsWindowEnabled
GetDlgItem
GetWindowLongW
IsWindow
DestroyWindow
CreateDialogIndirectParamW
SetActiveWindow
GetActiveWindow
GetDesktopWindow
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuW
GetFocus
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
ValidateRect
GetCursorPos
PeekMessageW
GetKeyState
IsWindowVisible
SetMenu
kernel32
GetModuleHandleW
WideCharToMultiByte
GlobalUnlock
GlobalLock
GlobalAlloc
FlushInstructionCache
GetCurrentProcess
lstrcmpW
MulDiv
SetLastError
WaitForSingleObject
HeapSetInformation
GlobalFree
DeleteCriticalSection
GetTickCount
MultiByteToWideChar
lstrlenA
GlobalHandle
FormatMessageW
InterlockedDecrement
InterlockedIncrement
CreateFileW
CloseHandle
LocalAlloc
GetLocaleInfoW
GetComputerNameW
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
InterlockedExchange
OpenProcess
GetModuleFileNameW
GetProcessId
CreateThread
Sleep
WaitForMultipleObjects
ProcessIdToSessionId
GetSystemDirectoryW
LCMapStringW
LoadLibraryExW
VirtualUnlock
VirtualLock
GetSystemInfo
ReleaseMutex
CreateMutexW
ResetEvent
SetEvent
CreateEventW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
InterlockedCompareExchange
GetThreadLocale
GetLocaleInfoA
GetACP
HeapSize
HeapDestroy
GetVersionExA
FreeLibrary
LoadLibraryW
GetProcAddress
GetCurrentThreadId
GetLastError
LocalFree
GetVersionExW
HeapFree
HeapReAlloc
HeapAlloc
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetTempPathW
msvcrt
_XcptFilter
_cexit
_initterm
__wgetmainargs
log10
memset
_wtoi64
iswdigit
_controlfp
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
exit
_exit
_wcmdln
_initterm
memcpy
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ