Static task
static1
Behavioral task
behavioral1
Sample
55790fd30f27849765e8b98f5a767491_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
55790fd30f27849765e8b98f5a767491_JaffaCakes118
-
Size
3.2MB
-
MD5
55790fd30f27849765e8b98f5a767491
-
SHA1
5702cd51d2ea4ac1ce8d84bba2bbd92552e20969
-
SHA256
7cc9fe215fb7824052758683ef270ecdca753638fb5043a8fbc3f8786cd88a04
-
SHA512
da31ab35c94b58362e1939071d7ca4ad3912c684382bc3e7d344ba86b577ff7753c03a58be034997ce214eefd01eb148e4167a9bb097ed0566ab450fc82b4c8e
-
SSDEEP
98304:QKMjAyYUHbLikrykMAIvK1aGoJ7kIS5RFEJbCTr:abLngi1aGoGBtr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 55790fd30f27849765e8b98f5a767491_JaffaCakes118
Files
-
55790fd30f27849765e8b98f5a767491_JaffaCakes118.exe windows:4 windows x86 arch:x86
f500013e1d3bcec62dd4b850bbbf8cb6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
SetFilePointer
GetFileSize
DeleteFileA
MoveFileA
WriteFile
ResetEvent
Sleep
LoadLibraryA
GetProcAddress
GetModuleFileNameA
RaiseException
DeleteCriticalSection
InitializeCriticalSection
GetProcessHeap
HeapFree
lstrlenA
FindClose
CreateDirectoryA
RemoveDirectoryA
FormatMessageA
FindFirstFileA
ReadFile
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
GetEnvironmentVariableA
GetLogicalDriveStringsA
GetDriveTypeA
GetTempFileNameA
FindNextFileA
CreateProcessA
GetExitCodeProcess
lstrcmpA
CreateFileA
GetCurrentThreadId
GetCurrentProcess
SizeofResource
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
GetDiskFreeSpaceA
GetModuleHandleA
FlushFileBuffers
GetVersion
GetPrivateProfileStringA
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcmpiA
InterlockedIncrement
InterlockedDecrement
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
MultiByteToWideChar
lstrlenW
CreateMutexA
GetFileAttributesA
SetFileAttributesA
CopyFileA
DebugBreak
HeapSize
HeapReAlloc
HeapDestroy
LocalAlloc
ExitProcess
GetStartupInfoA
GetCommandLineA
FindResourceExA
LoadResource
MulDiv
LockResource
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
lstrcatA
lstrcpyA
VirtualProtect
FindResourceA
WideCharToMultiByte
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
CreateEventA
SetEvent
GetExitCodeThread
WaitForSingleObject
GetLastError
CreateThread
CloseHandle
FreeLibrary
VirtualAlloc
GetSystemInfo
VirtualQuery
FlushInstructionCache
RtlUnwind
user32
CloseClipboard
EmptyClipboard
SetClipboardData
CreateDialogParamA
PostQuitMessage
GetPropA
CallWindowProcA
GetSystemMetrics
LoadImageA
DialogBoxParamA
OpenClipboard
ModifyMenuA
GetSystemMenu
SetFocus
RedrawWindow
ShowWindow
CreateWindowExA
DestroyWindow
RemovePropA
SetPropA
IsWindow
PostMessageA
MessageBoxA
KillTimer
EnableWindow
SetTimer
ScreenToClient
EnableMenuItem
GetSubMenu
LoadMenuA
TrackPopupMenu
DestroyMenu
IsDialogMessageA
GetActiveWindow
LoadStringA
SetWindowLongA
SendMessageA
EndDialog
GetWindowLongA
GetWindow
LoadIconA
InvalidateRect
DefWindowProcA
SystemParametersInfoA
GetWindowRect
GetParent
GetClientRect
MapWindowPoints
SetWindowPos
GetDlgItem
UnregisterClassA
CharNextA
GetDesktopWindow
IsWindowVisible
wvsprintfA
SetWindowTextA
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegDeleteValueA
RegEnumKeyExA
RegDeleteKeyA
RegQueryInfoKeyA
RegQueryValueExA
shell32
ShellExecuteA
ShellExecuteExA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHBrowseForFolderA
ole32
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
oleaut32
VarUI4FromStr
comctl32
DestroyPropertySheetPage
CreatePropertySheetPageA
PropertySheetA
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ