Static task
static1
Behavioral task
behavioral1
Sample
36adbdaffa63bc9518347963f4925214_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
36adbdaffa63bc9518347963f4925214_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
36adbdaffa63bc9518347963f4925214_JaffaCakes118
-
Size
272KB
-
MD5
36adbdaffa63bc9518347963f4925214
-
SHA1
2a891c9f46bd92829e25cb35bd238b031de4936c
-
SHA256
cc0c2917d585cf37c85a1980704dfb321fa80e93d27bc618c04f09b5e4524809
-
SHA512
586a152075884e795f16318a30eb0b3b1c0564e2d71a03fb1ea6664125e33b916467714d491ae7e5b5530f6751689807f9293ece32f3d35d4dc4fbb8f2c68674
-
SSDEEP
6144:cqezvnabw8b82kO+xqzdyctYrT7/PsW8EZd40seWs9Zxip:cPzvnuTgOfzbtYLPsfEHlWs9ap
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 36adbdaffa63bc9518347963f4925214_JaffaCakes118
Files
-
36adbdaffa63bc9518347963f4925214_JaffaCakes118.exe windows:4 windows x86 arch:x86
d8f894f830530a4135411796a3189fec
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
SetUnhandledExceptionFilter
IsBadWritePtr
HeapReAlloc
VirtualAlloc
LoadLibraryA
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
MoveFileA
SetFileAttributesA
DeleteFileA
GetFileAttributesA
TerminateProcess
ExitProcess
RaiseException
SetCurrentDirectoryA
GetCurrentDirectoryA
SetEnvironmentVariableA
CreateDirectoryA
HeapFree
HeapAlloc
HeapCompact
HeapSize
RtlUnwind
FindFirstFileA
FindClose
GetPrivateProfileStringA
GetModuleFileNameA
GetDriveTypeA
GetVersionExA
GetLastError
GetCurrentProcess
MoveFileExA
GetShortPathNameA
WritePrivateProfileStringA
GetTempPathA
SetFileTime
GetWindowsDirectoryA
GetSystemDirectoryA
GetFullPathNameA
GlobalHandle
lstrcatA
WinExec
GetDiskFreeSpaceA
LocalAlloc
LocalFree
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
CloseHandle
SetFilePointer
WriteFile
ReadFile
CreateFileA
VirtualFree
user32
GetSysColor
GetWindow
SendMessageA
ScreenToClient
GetWindowRect
GetDlgItem
CreateWindowExA
LoadIconA
LoadCursorA
RegisterClassA
FindWindowA
GetLastActivePopup
BringWindowToTop
AdjustWindowRectEx
UpdateWindow
ExitWindowsEx
IsIconic
RedrawWindow
PostQuitMessage
DefWindowProcA
ShowWindow
KillTimer
SetTimer
SetFocus
DialogBoxIndirectParamA
EndDialog
EnableWindow
MessageBoxA
CreateDialogIndirectParamA
IsDialogMessageA
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
RegisterWindowMessageA
OemToCharA
GetDlgItemTextA
PostMessageA
SetWindowTextA
GetParent
GetSystemMetrics
SetWindowPos
GetDC
wsprintfA
SetDlgItemTextA
ReleaseDC
SetWindowLongA
GetClientRect
BeginPaint
FillRect
EndPaint
gdi32
BitBlt
DeleteDC
CreateDIBPatternBrush
SelectObject
SetBkMode
SetTextColor
CreateCompatibleBitmap
IntersectClipRect
SelectPalette
RealizePalette
StretchDIBits
GetDeviceCaps
GetSystemPaletteEntries
CreatePalette
SetBkColor
ExtTextOutA
CreateFontIndirectA
DeleteObject
CreateSolidBrush
GetStockObject
CreateCompatibleDC
TextOutA
GetObjectA
comdlg32
GetSaveFileNameA
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegCloseKey
RegOpenKeyA
RegQueryValueExA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
VerFindFileA
comctl32
ord17
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE