Static task
static1
Behavioral task
behavioral1
Sample
0f07034c04b19faa07a28f4c7019c81a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f07034c04b19faa07a28f4c7019c81a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0f07034c04b19faa07a28f4c7019c81a_JaffaCakes118
-
Size
132KB
-
MD5
0f07034c04b19faa07a28f4c7019c81a
-
SHA1
5b013a33844f505e376bb705ab9ee02469a0d5f9
-
SHA256
aae58a9640865cb4d33c8fc4c108291721fe4ddeb1da17974bc45b98ae607c1b
-
SHA512
5d355bcdb0e2c146bb747a00d166ad274e24d8032bf43e8ec2b985ef02203f074f1ccafaee61db641210855b39009d99e9afef2bfeaa6a6c8dd652d38b5123ef
-
SSDEEP
3072:e+rwlGSu3MH57aYwIqTwUzL6/8dY3bdoDRWdu:PrgGd3u5eYRqT9L6UubdsWdu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f07034c04b19faa07a28f4c7019c81a_JaffaCakes118
Files
-
0f07034c04b19faa07a28f4c7019c81a_JaffaCakes118.exe windows:4 windows x86 arch:x86
0197f2b51e25ce512c68d5001af0cd2f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAlloc
GetProfileStringA
GlobalFree
GlobalLock
GlobalUnlock
GetWindowsDirectoryA
GetLocaleInfoW
SetFilePointer
FlushFileBuffers
RaiseException
GetLocaleInfoA
LoadLibraryA
VirtualAlloc
GetStringTypeA
GetProcAddress
GetStringTypeW
LCMapStringA
LCMapStringW
LeaveCriticalSection
EnterCriticalSection
WriteFile
RtlUnwind
InitializeCriticalSection
HeapCreate
HeapDestroy
VirtualFree
GetLastError
TlsGetValue
TlsAlloc
SetLastError
GetCurrentThreadId
DeleteCriticalSection
TlsSetValue
GetStdHandle
SetHandleCount
GetFileType
GetACP
GetCPInfo
GetOEMCP
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
TerminateProcess
lstrlenA
CreateFileA
DeviceIoControl
GetDriveTypeA
MultiByteToWideChar
lstrcpyA
GetDiskFreeSpaceA
lstrcmpiA
RtlZeroMemory
lstrcatA
GetProcessHeap
HeapAlloc
HeapFree
WideCharToMultiByte
CloseHandle
GetStartupInfoA
InterlockedIncrement
GetCurrentProcess
InterlockedDecrement
ExitProcess
SetStdHandle
GetCommandLineA
GetVersion
GetVolumeInformationA
lstrcmpA
GetModuleHandleA
user32
EndPaint
BeginPaint
MessageBoxA
SetForegroundWindow
GetWindowTextA
RegisterClassA
LoadStringA
EnumWindows
LoadCursorA
DefDlgProcA
LoadIconA
SendDlgItemMessageA
WinHelpA
ShowWindow
SetWindowLongA
GetWindowLongA
GetDlgItem
EndDialog
SetDlgItemTextA
LoadBitmapA
SetFocus
DialogBoxParamA
UpdateWindow
FillRect
DrawTextA
GetClientRect
GetDC
ReleaseDC
SetTimer
DefWindowProcA
UnregisterClassA
PeekMessageA
LoadImageA
PostMessageA
wsprintfA
TranslateMessage
DispatchMessageA
CheckDlgButton
CreateDialogParamA
DestroyWindow
GetDesktopWindow
IsDlgButtonChecked
EnableWindow
SetCursor
GetWindowRect
MoveWindow
CallWindowProcA
GetParent
InvalidateRect
DrawFocusRect
GetSysColor
DrawIconEx
SendMessageA
gdi32
GetStockObject
DeleteDC
DeleteObject
GetObjectA
SelectObject
StretchBlt
SetBkMode
CreateBitmap
CreateSolidBrush
CreateCompatibleBitmap
BitBlt
ExtTextOutA
CreateCompatibleDC
GetTextExtentPoint32A
SetBkColor
SetTextColor
advapi32
RegEnumValueA
RegDeleteValueA
RegSetValueExA
RegCloseKey
RegEnumKeyExA
RegQueryValueExA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegOpenKeyA
shell32
SHGetFileInfoA
ShellExecuteA
ExtractIconExA
ole32
CoTaskMemFree
CoTaskMemAlloc
CoUninitialize
CoInitialize
CoCreateInstance
CLSIDFromString
comctl32
ord17
PropertySheetA
CreatePropertySheetPageA
shlwapi
StrStrIA
Sections
.text Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ