Static task
static1
Behavioral task
behavioral1
Sample
0b530c93601dc6d05878350c49c73544_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b530c93601dc6d05878350c49c73544_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0b530c93601dc6d05878350c49c73544_JaffaCakes118
-
Size
64KB
-
MD5
0b530c93601dc6d05878350c49c73544
-
SHA1
c3c7687241413b7deb85521f6260164e679ddcf6
-
SHA256
6c5101b5078a3c52f7a41ce272fbc311a03759d261109b4b49269183764269be
-
SHA512
c1cf11cee9218e2756ea9dd8b1236d4c6b9505fac3ff6725a872bcb391d81d3a1721c6bdb4c4904bdd08e88fb30a4d5b63d348fe7239139ef9eeaed9cd987858
-
SSDEEP
1536:YRisBjNjzbtDIQ9iyD+16BVWWAeP6Zadsn:6isBpzbt7iyDJOWP6Zadsn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b530c93601dc6d05878350c49c73544_JaffaCakes118
Files
-
0b530c93601dc6d05878350c49c73544_JaffaCakes118.exe windows:4 windows x86 arch:x86
19a66bab2bdac48203c987a9f25ff25a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
ResumeThread
CreateThread
SetEvent
GetExitCodeThread
WinExec
DeleteFileA
lstrcpynW
lstrcpynA
LeaveCriticalSection
EnterCriticalSection
FlushInstructionCache
GetCurrentProcess
ResetEvent
DebugBreak
OutputDebugStringA
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
GetLastError
Sleep
InterlockedCompareExchange
WriteFile
CreateFileA
GetLocalTime
GetModuleHandleA
InterlockedDecrement
GetCurrentThreadId
OpenFile
GetFileSize
CloseHandle
ReadFile
lstrlenA
InterlockedIncrement
WaitForSingleObject
GetStartupInfoA
user32
GetClassInfoExA
GetSystemMetrics
MapWindowPoints
SystemParametersInfoA
GetWindow
GetParent
SetDlgItemTextA
SendDlgItemMessageA
LoadCursorA
CreateWindowExA
SetMenuDefaultItem
GetMenuItemInfoA
SetMenuItemInfoA
GetClientRect
GetWindowLongA
GetWindowRect
SetWindowPos
wsprintfA
LoadImageA
SendMessageA
RegisterClassExA
RegisterWindowMessageA
LoadStringA
LoadAcceleratorsA
FindWindowA
IsDialogMessageA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
CharNextA
wvsprintfA
CallWindowProcA
SetWindowLongA
GetSubMenu
LoadMenuA
DestroyMenu
GetCursorPos
SetForegroundWindow
TrackPopupMenu
GetMenuItemID
DefWindowProcA
IsWindowVisible
SetFocus
PostQuitMessage
LoadStringW
ShowWindow
MessageBoxA
DestroyWindow
LoadIconA
CreateDialogParamA
PostMessageA
TranslateAcceleratorA
DeleteMenu
IsIconic
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
shell32
Shell_NotifyIconA
ole32
CoUninitialize
CoInitializeEx
comctl32
InitCommonControlsEx
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
sprintf
_vsnprintf
memmove
atoi
_ismbcdigit
wcslen
_CxxThrowException
realloc
_ftol
free
__CxxFrameHandler
_purecall
??3@YAXPAX@Z
??2@YAPAXI@Z
urlmon
URLDownloadToCacheFileA
sensapi
IsNetworkAlive
wininet
InternetOpenA
InternetOpenUrlA
DeleteUrlCacheEntry
InternetGetConnectedState
InternetCloseHandle
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ