Static task
static1
Behavioral task
behavioral1
Sample
0da187d1e7fa5d6ccfd5e594d6c83280_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0da187d1e7fa5d6ccfd5e594d6c83280_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0da187d1e7fa5d6ccfd5e594d6c83280_JaffaCakes118
-
Size
182KB
-
MD5
0da187d1e7fa5d6ccfd5e594d6c83280
-
SHA1
102fa09538b9c8a09b112ba05e11f92a1f2f6092
-
SHA256
ef64bb5a576dc8deea7794ac999fad5cbc3a106c7fba5de4a35b47e9b35e42e5
-
SHA512
71119d0709d7def693850e4bf11b46214f2c2566bb120877b2335eae5224ac66ba01418b4138a796b69b1a57e494a04ec339c267dcfbd0da0519b1d7ae98cd59
-
SSDEEP
3072:exGi2ix54KcqOiSnFjrESb2VxVQh32DzqPtvNaSzhQ+NFHyDrzPc:9iX4KcqpSnV72VHyTqSzhQy2P
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0da187d1e7fa5d6ccfd5e594d6c83280_JaffaCakes118
Files
-
0da187d1e7fa5d6ccfd5e594d6c83280_JaffaCakes118.exe windows:4 windows x86 arch:x86
fa7438f7d04139d73940007657ae055c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoA
advapi32
RegQueryValueA
RegCreateKeyA
RegOpenKeyA
RegEnumValueA
ole32
StgCreateDocfileOnILockBytes
CoUnmarshalInterface
WriteClassStm
CoFreeUnusedLibraries
kernel32
LoadResource
GetProcAddress
GetCurrentThread
GetACP
VirtualAllocEx
ExitProcess
VirtualAlloc
IsBadReadPtr
SetThreadLocale
RaiseException
WriteFile
WaitForSingleObject
LocalReAlloc
VirtualFree
LocalAlloc
FindClose
GetLocaleInfoA
GetStringTypeA
CloseHandle
GetCommandLineA
lstrcpyA
GetDateFormatA
GetVersionExA
lstrlenA
IsBadHugeReadPtr
LocalFree
GetStringTypeW
GetCurrentProcess
SetLastError
MoveFileA
GlobalAlloc
ExitThread
CreateFileA
GetProcessHeap
SetEndOfFile
GetUserDefaultLCID
GetFileAttributesA
HeapDestroy
EnumCalendarInfoA
GetEnvironmentStrings
LoadLibraryExA
GetModuleFileNameA
GetModuleHandleW
FindResourceA
GetOEMCP
GetFileType
GetFullPathNameA
MoveFileExA
GetCurrentThreadId
GetCommandLineW
GetDiskFreeSpaceA
lstrcmpA
LockResource
CreateThread
SetFilePointer
VirtualQuery
GetModuleHandleA
GetLastError
SetEvent
GetTickCount
GetThreadLocale
user32
ReleaseCapture
LoadStringA
MessageBeep
RegisterClipboardFormatA
SetActiveWindow
LoadBitmapA
RedrawWindow
ScreenToClient
LoadIconA
MapWindowPoints
LoadCursorA
SendMessageW
RegisterClassA
MessageBoxA
PeekMessageW
RemovePropA
PostQuitMessage
ReleaseDC
OpenClipboard
ScrollWindow
PeekMessageA
OffsetRect
PtInRect
OemToCharA
RegisterWindowMessageA
RemoveMenu
MapVirtualKeyA
PostMessageA
LoadKeyboardLayoutA
SendMessageA
shell32
SHGetSpecialFolderLocation
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hdata Size: 1024B - Virtual size: 897B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ