Static task
static1
Behavioral task
behavioral1
Sample
1351f3314f5959f5c21476e95f452549_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1351f3314f5959f5c21476e95f452549_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1351f3314f5959f5c21476e95f452549_JaffaCakes118
-
Size
646KB
-
MD5
1351f3314f5959f5c21476e95f452549
-
SHA1
140b7c5ae5e3725d958b9c990e45668cb9538cfa
-
SHA256
dd60ac95b9dba0ec2a87e5c96e535a4112ad8ad4b426ffea2ae2c9a473577b53
-
SHA512
a4bf71aaf37847bba7d6b6005d83c3619f68f2180809585d977cc0d251fc1d38818c03786cf423f5da2ee4331553e249a9694e8798940e41300d72441e6e5a68
-
SSDEEP
6144:K22caelrduIkYe8I7kW/EI3HQZMlZ3OlunFvUF8M8rFa/G7+UIe:jaelrdrskwE/+gavVHrFa1e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1351f3314f5959f5c21476e95f452549_JaffaCakes118
Files
-
1351f3314f5959f5c21476e95f452549_JaffaCakes118.exe windows:4 windows x86 arch:x86
e147985f40c919756fc7185d46646425
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateEllipticRgnIndirect
CreateEllipticRgn
shell32
Shell_NotifyIconA
FindExecutableA
advapi32
LookupPrivilegeDisplayNameA
SetNamedSecurityInfoW
ClearEventLogW
BuildSecurityDescriptorW
ControlService
GetSidLengthRequired
RegCreateKeyExA
GetExplicitEntriesFromAclW
OpenEventLogW
RegEnumKeyExA
EnumServicesStatusA
SetFileSecurityA
MakeSelfRelativeSD
NotifyChangeEventLog
AccessCheck
oleaut32
SafeArrayGetElement
SetErrorInfo
SysFreeString
kernel32
GetPrivateProfileSectionW
CreateEventA
_lread
LocalAlloc
IsBadReadPtr
EraseTape
ExitProcess
FindCloseChangeNotification
GetVersion
LeaveCriticalSection
FindResourceExA
GetComputerNameW
GetStartupInfoA
GetModuleHandleA
GetLongPathNameA
GetACP
SetFileAttributesA
SetCommMask
ReadConsoleA
FormatMessageA
SetFileTime
GetCommConfig
GetUserDefaultLangID
EnumCalendarInfoW
FindNextChangeNotification
FindFirstFileExW
WriteConsoleOutputW
ReadDirectoryChangesW
GetLocaleInfoW
GlobalFindAtomW
SetConsoleOutputCP
IsDBCSLeadByteEx
LCMapStringA
GetShortPathNameA
VirtualProtect
GetTapeStatus
GetDriveTypeA
GetTimeZoneInformation
GetUserDefaultLCID
SetMailslotInfo
FindResourceExW
QueryDosDeviceW
VirtualQuery
DuplicateHandle
GetSystemInfo
ConnectNamedPipe
WritePrivateProfileStructA
GetSystemDefaultLangID
ReadFileScatter
_lclose
GetVolumeInformationW
FillConsoleOutputCharacterA
GetSystemDirectoryW
GetBinaryTypeW
OpenSemaphoreW
comdlg32
GetSaveFileNameA
PageSetupDlgA
user32
SetFocus
SetUserObjectInformationW
WindowFromDC
EnumDisplayMonitors
GetMenuState
CheckRadioButton
ActivateKeyboardLayout
DrawMenuBar
PostQuitMessage
GetClipCursor
SetCursor
GetMonitorInfoW
InsertMenuItemA
wsprintfA
ScreenToClient
GetSysColorBrush
RemovePropA
GetClientRect
DrawTextW
CreateWindowExA
OemToCharBuffW
MessageBoxIndirectW
GetClassInfoW
DialogBoxIndirectParamA
HideCaret
DestroyCursor
SendInput
SetCaretBlinkTime
GetCursor
SetWindowsHookExA
GetWindowLongW
UnhookWindowsHookEx
BeginDeferWindowPos
msvcrt
_wsystem
strpbrk
_popen
_unlink
_fdopen
mbstowcs
_mbschr
_open_osfhandle
wcsftime
_vsnwprintf
_wremove
iswascii
_wputenv
Sections
.text Size: 304KB - Virtual size: 304KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 326KB - Virtual size: 326KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ