Static task
static1
Behavioral task
behavioral1
Sample
550c459e693e235310649449538a12f5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
550c459e693e235310649449538a12f5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
550c459e693e235310649449538a12f5_JaffaCakes118
-
Size
121KB
-
MD5
550c459e693e235310649449538a12f5
-
SHA1
fe878664a4ed3e33c4d779424578364332d22a64
-
SHA256
09c3a4c68e4c8f02910a485a980c9431df82843e986d07c0dcaae72b7448b585
-
SHA512
e1e0e9d9d4448f096b43d8e7e74baef1f3f1918f1305a095ef86e86cb618989717d6d1015b0e6a0d1ea4f399944e3aa0ec37c97e2baa97edf2823cad80c8a12e
-
SSDEEP
3072:72c+NPgVpHBnwbZjQlNf7supkGlypL+vCsBs4osb9q7:7bb6buTplyIqiMsxq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 550c459e693e235310649449538a12f5_JaffaCakes118
Files
-
550c459e693e235310649449538a12f5_JaffaCakes118.exe windows:4 windows x86 arch:x86
650e562f3aa3a8dec159017db5d2cbd2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadCursorA
PeekMessageW
ReleaseDC
MessageBeep
ScreenToClient
OemToCharA
PostQuitMessage
SetActiveWindow
LoadIconA
PtInRect
RegisterWindowMessageA
LoadBitmapA
PostMessageA
OpenClipboard
ScrollWindow
SendMessageA
LoadKeyboardLayoutA
MessageBoxA
SendMessageW
RedrawWindow
RemovePropA
LoadStringA
ReleaseCapture
MapVirtualKeyA
RemoveMenu
RegisterClassA
PeekMessageA
MapWindowPoints
RegisterClipboardFormatA
OffsetRect
kernel32
CompareStringA
ExitThread
lstrlenW
EnterCriticalSection
SetFilePointer
HeapDestroy
LocalReAlloc
GetOEMCP
ExitProcess
lstrcmpiA
GetDateFormatA
GetSystemDefaultLangID
IsBadHugeReadPtr
GetFullPathNameA
FreeLibrary
GetEnvironmentStrings
LoadLibraryExA
GetCPInfo
FindClose
LoadLibraryA
VirtualAllocEx
GetTickCount
FormatMessageA
WaitForSingleObject
GetUserDefaultLCID
lstrcatA
lstrlenA
CloseHandle
GetCommandLineW
SetThreadLocale
WideCharToMultiByte
SizeofResource
GetModuleHandleA
GetFileType
GetThreadLocale
GetFileSize
GlobalAddAtomA
GetVersion
GetLocalTime
SetHandleCount
FindResourceA
GetDiskFreeSpaceA
InitializeCriticalSection
GetCurrentThread
ReadFile
GetProcessHeap
GlobalFindAtomA
GetModuleHandleW
GetFileAttributesA
GlobalAlloc
GetCurrentProcessId
LoadResource
VirtualAlloc
GetLastError
GetCurrentProcess
GetVersionExA
lstrcmpA
GetACP
LocalFree
SetEvent
GetProcAddress
version
VerQueryValueA
advapi32
GetLengthSid
RegCreateKeyA
RegCreateKeyExA
gdi32
CreateCompatibleDC
LineTo
RestoreDC
GetDCOrgEx
CreatePalette
msvcrt
memmove
atol
Sections
CODE Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cdata Size: 1024B - Virtual size: 808B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ