Static task
static1
Behavioral task
behavioral1
Sample
53ab55e3613f551d6d0feaff84649928_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
53ab55e3613f551d6d0feaff84649928_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
53ab55e3613f551d6d0feaff84649928_JaffaCakes118
-
Size
366KB
-
MD5
53ab55e3613f551d6d0feaff84649928
-
SHA1
ce3d3fd99a01d2c9e3fab938a3be82099fc8645e
-
SHA256
d254a5643595d62f80a47c907970abd466bc46cef594d2da2a5c3405be4a90e0
-
SHA512
ecf6e7cb636c17273eeb1753b27ed6c67f0c09d1cd213ba7ad540edc8ae550fd11aaffcd816c7cd1441c10507070e1cd5c83a0cba08af6252adf5d2534488e28
-
SSDEEP
6144:ndJIRQzHyDQpTTmCcqi2fo0nh6h0u5tuOaWnX7CcwNse36THwdpfsytplad10O:nrIRQjyD2bcq5foJ0Q9zX7qz36THwdpF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53ab55e3613f551d6d0feaff84649928_JaffaCakes118
Files
-
53ab55e3613f551d6d0feaff84649928_JaffaCakes118.exe windows:7 windows x86 arch:x86
5167eca1066ac13ea6d4b2df6ae3a152
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
gdi32
GetTextColor
GetDIBColorTable
CreateFontIndirectW
CreatePen
GetPaletteEntries
PtVisible
SetBkColor
RoundRect
Ellipse
UnrealizeObject
SetTextAlign
EnumFontFamiliesW
GetTextExtentPoint32W
StretchBlt
CreateRectRgnIndirect
SetTextColor
EnumFontFamiliesExW
ExtFloodFill
SetROP2
Escape
GetNearestColor
Rectangle
DeleteObject
SetDIBitsToDevice
OffsetRgn
SetBkMode
GetNearestPaletteIndex
PolyBezier
CreateHalftonePalette
Polygon
StretchDIBits
MoveToEx
LineTo
CreateDIBitmap
RestoreDC
BitBlt
GetDIBits
GetBkMode
SaveDC
RectVisible
GetDeviceCaps
CreateICW
CreateCompatibleDC
SetMapMode
SelectObject
GetStockObject
SetStretchBltMode
ExtTextOutW
CreatePolygonRgn
user32
WinHelpW
SystemParametersInfoW
BeginPaint
GetDlgItemInt
SendMessageW
DrawTextW
ValidateRect
GetCaretPos
ReleaseDC
DestroyWindow
GetParent
GetDlgItem
CheckMenuItem
SetWindowTextW
IsRectEmpty
SetActiveWindow
MessageBeep
ScreenToClient
SetWindowLongW
GetDesktopWindow
IsClipboardFormatAvailable
ShowCaret
DispatchMessageW
IsMenu
GetWindowRect
PeekMessageW
EnableScrollBar
wsprintfW
GetSubMenu
SetRect
SetRectEmpty
GetMenu
SetCapture
SetDlgItemInt
LoadBitmapW
GetUpdateRect
LoadMenuW
GetSystemMenu
HideCaret
RemoveMenu
ReleaseCapture
UpdateWindow
FrameRect
SetTimer
BringWindowToTop
WindowFromPoint
PostMessageW
EnableWindow
TabbedTextOutW
CreateCaret
InvalidateRect
FillRect
GrayStringW
MessageBoxW
DestroyCaret
CheckDlgButton
GetKeyboardLayout
gdiplus
GdipGetImageEncoders
GdipGetImageDecodersSize
GdipAlloc
GdipGetImageEncodersSize
GdipCreateBitmapFromFile
GdipSetPropertyItem
GdipSaveImageToStream
GdiplusStartup
GdipSaveImageToFile
GdipCreateBitmapFromFileICM
GdiplusShutdown
GdipGetImageRawFormat
GdipDisposeImage
ole32
ReleaseStgMedium
WriteFmtUserTypeStg
CoTaskMemFree
CoInitialize
PropVariantClear
CoGetInterfaceAndReleaseStream
CoUninitialize
CoMarshalInterThreadInterfaceInStream
CLSIDFromString
kernel32
MultiByteToWideChar
HeapSetInformation
QueryPerformanceCounter
GetTempFileNameW
InterlockedIncrement
GetProcAddress
LoadLibraryW
HeapQueryInformation
LocalFree
GetCurrentThreadId
GetFileTime
FindFirstFileW
GlobalFree
lstrlenW
GetSystemTimeAsFileTime
GetModuleHandleW
GetTimeFormatW
RaiseException
GetProcessHeap
lstrcmpW
CloseHandle
GlobalLock
CreateDirectoryW
GlobalAlloc
GlobalReAlloc
SetEndOfFile
GetProcessHeaps
GetThreadLocale
GetNumberFormatW
lstrlenA
GetStartupInfoW
lstrcmpiW
FreeLibrary
lstrcatW
GetLastError
VirtualFree
InterlockedDecrement
MulDiv
GetCurrentProcess
GetFileSize
GetExitCodeThread
GetLocaleInfoW
LocalAlloc
SetErrorMode
VirtualAlloc
FileTimeToSystemTime
IsDBCSLeadByte
FindClose
Sections
.text Size: 184KB - Virtual size: 184KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 177KB - Virtual size: 840KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ