Static task
static1
Behavioral task
behavioral1
Sample
0d212a25a41be896dbd29e4c3083230f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d212a25a41be896dbd29e4c3083230f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0d212a25a41be896dbd29e4c3083230f_JaffaCakes118
-
Size
54KB
-
MD5
0d212a25a41be896dbd29e4c3083230f
-
SHA1
5f610cb449bd90f9cb4384992310af0cb7b39181
-
SHA256
67305f010fcd31f95c99f27d43ff81c2de9bc58415755e501eaa504c9f3a05c8
-
SHA512
f852cfc6eb6e934e77eed73ae34c61f2081b40c5a56c2ae0e0bbe630a173a7c29859f1232ebe89d82a077cc877aeaedba8646e066a3eede3ba85f9c697319908
-
SSDEEP
768:oLbOvJTkvYTWsTBKjm3mZXqLb+hqwehj84IldQsew2S0BG+ABhr5lWRsQi/R68nI:kO5EAWsTBWXReb+hqjj0k40PATNuOrqt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d212a25a41be896dbd29e4c3083230f_JaffaCakes118
Files
-
0d212a25a41be896dbd29e4c3083230f_JaffaCakes118.exe windows:4 windows x86 arch:x86
aac8ca74754666d4caddf8393150a419
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
SizeofResource
LoadResource
FindResourceA
FreeResource
SetThreadLocale
GetUserDefaultLCID
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
DeleteFileA
GetTempFileNameA
GetTempPathA
lstrlenW
InterlockedDecrement
GetStringTypeExA
GetThreadLocale
HeapCreate
InitializeCriticalSection
FindResourceExA
GetProcAddress
ReadFile
GetFileSize
CreateFileA
WriteFile
GetVolumeInformationA
GetComputerNameA
FindClose
FindFirstFileA
GetWindowsDirectoryA
GetFileAttributesA
GetSystemTime
GetSystemDirectoryA
FindNextFileA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
LockResource
GetCurrentProcess
GetLastError
GetShortPathNameA
GetEnvironmentVariableA
LoadLibraryA
GetModuleFileNameA
OpenEventW
CreateEventW
CloseHandle
WaitForSingleObject
GetExitCodeProcess
SetEvent
InterlockedIncrement
lstrlenA
GetTickCount
GetVersionExA
HeapFree
HeapAlloc
GetCommandLineA
ExitProcess
GetStartupInfoA
FlushInstructionCache
GetModuleHandleA
user32
SetCursor
GetWindowTextA
GetWindowTextLengthA
UpdateWindow
InvalidateRect
RedrawWindow
ScreenToClient
ClientToScreen
CharLowerA
LoadStringW
GetParent
GetWindow
GetWindowRect
SystemParametersInfoA
GetClientRect
MapWindowPoints
CallWindowProcA
SetWindowLongA
LoadStringA
wvsprintfA
EnableWindow
SetTimer
SetWindowTextA
SetDlgItemTextA
IsDlgButtonChecked
GetSystemMetrics
LoadImageA
SendMessageA
GetDlgItem
CheckDlgButton
EndDialog
DefWindowProcA
PostMessageA
GetActiveWindow
GetSysColor
SetWindowPos
GetWindowLongA
DialogBoxParamA
MessageBoxA
CharNextA
GetMessageA
gdi32
CreateSolidBrush
SetTextColor
GetStockObject
CreateFontIndirectA
DeleteObject
GetObjectA
advapi32
OpenServiceA
LsaClose
LsaOpenPolicy
GetTokenInformation
OpenProcessToken
RegCloseKey
RegSetValueExA
RegCreateKeyExA
GetUserNameA
CloseServiceHandle
ChangeServiceConfigA
RegOpenKeyExA
OpenSCManagerA
CreateWellKnownSid
RegQueryValueExA
LsaAddAccountRights
shell32
ShellExecuteA
ShellExecuteExA
ole32
CoInitialize
StringFromGUID2
comctl32
InitCommonControlsEx
wininet
InternetQueryDataAvailable
InternetOpenA
InternetConnectA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetCloseHandle
InternetReadFile
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
Sections
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ