Static task
static1
Behavioral task
behavioral1
Sample
52e63278de1aeadd45624c6ce9702664_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
52e63278de1aeadd45624c6ce9702664_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
52e63278de1aeadd45624c6ce9702664_JaffaCakes118
-
Size
439KB
-
MD5
52e63278de1aeadd45624c6ce9702664
-
SHA1
960f770be1ee5776b7f9f21e89377fe561320305
-
SHA256
6993a88dbf4f45275a5cf31b5acb33360ccc8ba7f07e4169bf0262b71f07fd5b
-
SHA512
31b092b160dc1aefd0fcca41494e290d3a073ee2b2c2252490f2e664dfd1aaa3fb90b68b0b9bedfc86164e49c5b877952565770cfc82ccb71884c500ce8da496
-
SSDEEP
12288:hijjVc152FosX+99FxHOkCrDac89h5Qu:hiXe+WsS9gaD9h+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 52e63278de1aeadd45624c6ce9702664_JaffaCakes118
Files
-
52e63278de1aeadd45624c6ce9702664_JaffaCakes118.exe windows:4 windows x86 arch:x86
505d69fdef9bd95d035eb349760b67a0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_expand
strcat
_chsize
strlen
_ltoa
memcpy
_CIcosh
_adj_fdiv_m64
_wmkdir
_getdllprocaddr
__wgetmainargs
_mbsdup
_adj_fdivr_m32i
_abnormal_termination
_longjmpex
_mbsdec
_ftime
gdi32
GdiGetBatchLimit
SetLayout
EnumFontFamiliesW
CancelDC
EqualRgn
SetLayout
ArcTo
GetTextMetricsA
GetCharacterPlacementW
ResizePalette
GetROP2
SetPixelV
GetEnhMetaFileW
GetPixel
GetRgnBox
advapi32
ImpersonateSelf
RegRestoreKeyW
GetAccessPermissionsForObjectW
InitializeSecurityDescriptor
ObjectOpenAuditAlarmW
user32
EndDeferWindowPos
RegisterWindowMessageW
IsWindow
GetPriorityClipboardFormat
IsChild
LoadMenuA
DdeDisconnect
SetProcessWindowStation
SetCapture
OpenDesktopA
IsMenu
DdeQueryStringA
DdeUninitialize
GetMenuStringA
CreateMDIWindowW
GetKeyboardState
InvalidateRect
UnregisterClassW
WINNLSGetEnableStatus
GetListBoxInfo
SetDoubleClickTime
DdeCmpStringHandles
LoadCursorFromFileA
FlashWindowEx
GetWindowDC
NotifyWinEvent
kernel32
RequestWakeupLatency
GetSystemDirectoryW
GetTickCount
GetModuleHandleA
ReleaseMutex
GetStartupInfoW
EnumSystemLocalesW
Sleep
GetNamedPipeHandleStateW
_llseek
OpenSemaphoreW
ExitProcess
LocalAlloc
SetErrorMode
GetSystemTimeAsFileTime
GetCommandLineW
VirtualAlloc
PulseEvent
GetCurrentProcess
MulDiv
VirtualFree
DeleteAtom
GlobalGetAtomNameA
GetThreadSelectorEntry
Sections
.text Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0001 Size: 39KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0002 Size: 40KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0003 Size: 40KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0004 Size: 43KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0005 Size: 41KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0006 Size: 44KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0007 Size: 120KB - Virtual size: 13.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE