Static task
static1
Behavioral task
behavioral1
Sample
13396a6b2187daa65a3c3a24be585816_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13396a6b2187daa65a3c3a24be585816_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
13396a6b2187daa65a3c3a24be585816_JaffaCakes118
-
Size
146KB
-
MD5
13396a6b2187daa65a3c3a24be585816
-
SHA1
0fbc938c44fdc913cef17391093edfdfb0b8a6b7
-
SHA256
e62aa18d5df15397962ca654a6cf51d70336ce77dd6a18066bc21c5d866d14b4
-
SHA512
a31338620437dc42d375b56cd058b6b26589e4cb8eba257d57b53d8bcd68753e75d32df8767239f411af8a2691ac79d0883fa7e37829d84a8b20f34607328906
-
SSDEEP
3072:I/ygtwKmvM25Ciko58nY2Wh+W2Zc2w3XPu5itUzUkT00GDg579UfUY4DzvwQ:I/ygtwXAgL2TZUclzxY7Dg19Uf+DD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 13396a6b2187daa65a3c3a24be585816_JaffaCakes118
Files
-
13396a6b2187daa65a3c3a24be585816_JaffaCakes118.exe windows:4 windows x86 arch:x86
73ca4dd18d215b5cca483e02a71aa69d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
LoadLibraryA
GetProcAddress
IsBadWritePtr
VirtualAlloc
GetOEMCP
GetACP
GetCPInfo
FatalAppExitA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
WriteFile
RtlUnwind
VirtualFree
HeapCreate
LCMapStringA
GetCurrentThread
GetLastError
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
DeleteCriticalSection
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
LCMapStringW
GetStringTypeA
GetModuleHandleW
GetCommandLineW
GetVersion
CloseHandle
GetProcessHeap
HeapFree
HeapReAlloc
HeapAlloc
CreateFileW
ReadFile
HeapDestroy
GetCommandLineA
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetStringTypeW
user32
CallNextHookEx
SetTimer
KillTimer
LoadIconW
MessageBoxW
SetPropA
GetSystemMenu
GetMenuItemCount
GetMenuItemID
RemoveMenu
UnhookWindowsHookEx
CreateDialogIndirectParamW
GetWindowTextW
DialogBoxIndirectParamW
GetScrollInfo
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
CheckRadioButton
EndDialog
SendDlgItemMessageW
OffsetRect
DestroyWindow
LoadImageA
InflateRect
ClientToScreen
InsertMenuItemW
IntersectRect
CreateMenu
GetPropA
LoadCursorA
RegisterClassExW
ScreenToClient
SetWindowsHookExW
advapi32
RegisterServiceCtrlHandlerW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
StartServiceCtrlDispatcherW
RegSetValueExW
RegEnumKeyW
OpenSCManagerW
CloseServiceHandle
RegDeleteKeyW
RegCreateKeyExW
QueryServiceStatus
RegOpenKeyA
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 43KB - Virtual size: 654KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ