Static task
static1
Behavioral task
behavioral1
Sample
302aa489e752eb6d6621943319813d90_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
302aa489e752eb6d6621943319813d90_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
302aa489e752eb6d6621943319813d90_JaffaCakes118
-
Size
68KB
-
MD5
302aa489e752eb6d6621943319813d90
-
SHA1
f4d4f893d0760192fb05f3cafadf6ab4d164abf2
-
SHA256
7328255bb2fcf20fa7f8387661a439b5628330cc26462d2738bccf0d1f247e35
-
SHA512
da5a92bd1cc73c217c239bdc84e6186bda44b9f271e6e309191edfe8caf8b5fed7b963cb4eb400f80dc523a4244429fe6b463fe8ef20a2951a1c8441650d5ab6
-
SSDEEP
768:JqCh80vcQJrP5sIbPO5Rj9aVfj9fUOG1odrJYIx:k0vccNeRja5fUOuodr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 302aa489e752eb6d6621943319813d90_JaffaCakes118
Files
-
302aa489e752eb6d6621943319813d90_JaffaCakes118.exe windows:4 windows x86 arch:x86
178e5c441f75831196fba55110cfa486
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
LoadLibraryA
OpenProcess
GetProcAddress
CreateMutexA
CreateProcessA
GetLastError
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FlushFileBuffers
SetStdHandle
Sleep
GetTempPathA
FindFirstFileA
GetTickCount
DeleteFileA
FindNextFileA
FindClose
RemoveDirectoryA
GetModuleFileNameA
GetSystemDirectoryA
SetCurrentDirectoryA
SetFilePointer
GetVersionExA
GetSystemTime
FreeEnvironmentStringsW
lstrlenA
GetModuleHandleA
WideCharToMultiByte
GetCurrentProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
GetCPInfo
GetACP
GetOEMCP
UnhandledExceptionFilter
FreeEnvironmentStringsA
VirtualFree
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
MultiByteToWideChar
RtlUnwind
WriteFile
VirtualAlloc
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
LoadIconA
DefWindowProcA
DestroyWindow
BeginPaint
GetClientRect
DrawTextA
EndPaint
PostQuitMessage
CreateWindowExA
ShowWindow
UpdateWindow
LoadCursorA
RegisterClassExA
ExitWindowsEx
LoadStringA
wsprintfA
PeekMessageA
TranslateMessage
PostThreadMessageA
DispatchMessageA
GetForegroundWindow
MessageBoxA
advapi32
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
shell32
ShellExecuteA
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ