Static task
static1
Behavioral task
behavioral1
Sample
54832efb7fcf2ef49cb50cd3a039d297_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54832efb7fcf2ef49cb50cd3a039d297_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
54832efb7fcf2ef49cb50cd3a039d297_JaffaCakes118
-
Size
140KB
-
MD5
54832efb7fcf2ef49cb50cd3a039d297
-
SHA1
de62f5298b6289ddeaf6d2d3f5372a1332b0c1c4
-
SHA256
1ee1704bb623d0c971bc48e12a8daf199f9b08941e0ad022128af88418ac809b
-
SHA512
854591176c5e39eae4fa7db88739d7068ce811e34cbb4046ebc8f6ab81b8a985e7f3f0a34e2e013f189fac859e66f2a29512ddaa714bfba90d9310abe54698e7
-
SSDEEP
3072:5stK5eEVsOOSL4HInaDbpTBm3gUuAdofT7SrmXJzwwI1vuWZ:5bsOOIZSXm3efT7SK5MwI1tZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 54832efb7fcf2ef49cb50cd3a039d297_JaffaCakes118
Files
-
54832efb7fcf2ef49cb50cd3a039d297_JaffaCakes118.exe windows:4 windows x86 arch:x86
af0a696fd64a8a977edd4f40a4104b84
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathA
kernel32
WaitForSingleObject
CreateThread
CreateEventA
Sleep
lstrcmpiA
GetCommandLineA
CloseHandle
GetShortPathNameA
GetModuleHandleA
FreeLibrary
SizeofResource
LoadResource
FindResourceA
GetLastError
FlushInstructionCache
SetEvent
IsDBCSLeadByte
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcatA
GetStringTypeExA
GetThreadLocale
WriteFile
ReadFile
CreateFileA
GetVersionExA
GetCurrentProcess
LoadLibraryExA
lstrcpynA
GetCurrentThreadId
InterlockedDecrement
WideCharToMultiByte
GetStartupInfoA
LocalFree
lstrlenA
lstrlenW
MultiByteToWideChar
lstrcmpA
CreateDirectoryA
GetModuleFileNameA
InterlockedIncrement
LeaveCriticalSection
EnterCriticalSection
user32
SetWindowPos
GetParent
EndDialog
SetFocus
RegisterWindowMessageA
SetDlgItemTextA
GetDlgItem
MessageBeep
SetWindowLongA
IsDlgButtonChecked
DestroyWindow
CallWindowProcA
GetKeyState
LoadIconA
DestroyIcon
DefWindowProcA
GetWindowRect
SystemParametersInfoA
GetClientRect
MapWindowPoints
GetWindowTextA
SendMessageA
GetActiveWindow
GetMessageA
DispatchMessageA
CharNextA
PostThreadMessageA
DialogBoxParamA
LoadStringA
GetWindow
GetWindowLongA
MessageBoxA
GetWindowTextLengthA
advapi32
RegDeleteValueA
RegOpenKeyExA
RegEnumValueA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
ole32
CoTaskMemAlloc
CoInitialize
CoTaskMemFree
CoRevokeClassObject
CoTaskMemRealloc
CoRegisterClassObject
CoCreateInstance
CoDisconnectObject
CoUninitialize
oleaut32
SysFreeString
SysStringLen
VariantCopy
LoadRegTypeLi
RegisterTypeLi
LoadTypeLi
VarUI4FromStr
VariantChangeType
VariantInit
VariantClear
SysAllocString
SysAllocStringLen
comctl32
DestroyPropertySheetPage
PropertySheetA
ImageList_Create
CreatePropertySheetPageA
ImageList_ReplaceIcon
msvcrt
_acmdln
exit
_XcptFilter
_exit
_onexit
_strlwr
__getmainargs
__setusermatherr
_initterm
_CxxThrowException
_stricmp
wcstombs
_mbsspn
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_strdup
_controlfp
_except_handler3
fgets
?terminate@@YAXXZ
_strcmpi
_mbsnbcmp
_mbsstr
_mbsnbcpy
_mbschr
_mbscspn
strncmp
isdigit
fprintf
fopen
??1type_info@@UAE@XZ
__dllonexit
memset
??2@YAPAXI@Z
fclose
_lrotl
_mbstok
memmove
strchr
memcmp
realloc
malloc
free
_purecall
_wcsicmp
wcslen
__CxxFrameHandler
atoi
memcpy
strrchr
strlen
wcscmp
Sections
.text Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ