Static task
static1
Behavioral task
behavioral1
Sample
37e691ce66097c278af8e613c18f227e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
37e691ce66097c278af8e613c18f227e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
37e691ce66097c278af8e613c18f227e_JaffaCakes118
-
Size
54KB
-
MD5
37e691ce66097c278af8e613c18f227e
-
SHA1
5ba384def0ea7b677e4588e2d6ffd1714517ef5b
-
SHA256
562fc1f74a762f851afb94a0c44be8265cc0bb7035f60aa641a523a5ca19c2bd
-
SHA512
2da59b9865bbec5ab05d24991e1d9b4446a97581588543b953fa4ae9e9365bb510a7b23f61eb92b686564f8ebc66537d669b0385b14decd2f4a9c90a42eb1895
-
SSDEEP
1536:RixmMVqxqguoiUfXMK/uLtOrHckY2/WWzC:R4mMAeUfXMVLwAkO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37e691ce66097c278af8e613c18f227e_JaffaCakes118
Files
-
37e691ce66097c278af8e613c18f227e_JaffaCakes118.exe windows:4 windows x86 arch:x86
6f0999cb1c5b0307987072710c7e9167
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowPos
SetRect
RegisterClipboardFormatW
GetDlgItemTextW
GetSysColor
SetWindowLongA
DispatchMessageW
LoadIconW
BeginPaint
RegisterClassExA
SendDlgItemMessageW
RedrawWindow
GetMessageW
CallNextHookEx
DrawTextW
SetWindowTextA
DrawTextA
CreateWindowExW
CheckDlgButton
CopyRect
UpdateWindow
EndDialog
PeekMessageA
LoadImageW
LoadStringW
UnregisterClassW
EndPaint
WinHelpW
GetWindowPlacement
InsertMenuW
CreateDialogParamW
GetProcessWindowStation
DestroyIcon
CharUpperA
GetWindowThreadProcessId
kernel32
LeaveCriticalSection
lstrlenW
GetFileAttributesA
FindResourceW
GetCommandLineA
LCMapStringW
QueryPerformanceCounter
VirtualAlloc
lstrcpynW
GetModuleHandleA
GetFileSize
GetACP
GetLastError
ResumeThread
SystemTimeToFileTime
GetExitCodeThread
Sleep
HeapDestroy
ExitProcess
GetCurrentThreadId
OpenEventW
GlobalAlloc
CreateDirectoryA
GetVersion
GetCurrentProcessId
CreateProcessA
IsBadReadPtr
GetFileAttributesW
GetStdHandle
lstrcatA
GetStartupInfoA
GetCommandLineW
IsBadWritePtr
SetEvent
GetCurrentProcess
GetTickCount
SetLastError
GetModuleHandleW
GetThreadPriority
ReleaseMutex
HeapAlloc
RtlUnwind
FindResourceA
OpenEventA
GetThreadLocale
SizeofResource
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.textbss Size: 512B - Virtual size: 389B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.textbss Size: 512B - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 512B - Virtual size: 463B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 460B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ