Static task
static1
Behavioral task
behavioral1
Sample
5710a79000e29e13266b38d626236ed6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5710a79000e29e13266b38d626236ed6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5710a79000e29e13266b38d626236ed6_JaffaCakes118
-
Size
532KB
-
MD5
5710a79000e29e13266b38d626236ed6
-
SHA1
67e22bdb96c48cee6f1d9be8d0095646fff89270
-
SHA256
5cb2d273d044aa4d4edbc8f71637f9bb914bdda187fa07af6df887db80644613
-
SHA512
e128238804308436d3c845edc4bceafb20ab9b4c218248a547892570851014a8f51d1b9b64bce88689ac98d4ead3a48ab671c36d3a734f314f5f9811cba26ab2
-
SSDEEP
6144:+/Q5sXElRUjnaekHRmJzY1HEJlw+/0LkGsDsBo8YsHPabWk96kAD:hP+aLma1g/0LxBo8YsE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5710a79000e29e13266b38d626236ed6_JaffaCakes118
Files
-
5710a79000e29e13266b38d626236ed6_JaffaCakes118.exe windows:4 windows x86 arch:x86
bfad845f3ce3325867e000a143c2b425
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEnvironmentVariableW
GetCurrentProcess
CreateThread
InitializeCriticalSection
FormatMessageW
SetEvent
CloseHandle
GetTickCount
WaitForSingleObject
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
lstrcpynA
GetModuleHandleA
LocalReAlloc
GetSystemDefaultLangID
GetVersionExA
FileTimeToSystemTime
FileTimeToLocalFileTime
InterlockedExchange
lstrlenA
DuplicateHandle
FreeLibrary
GetProcAddress
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
DeleteCriticalSection
LocalAlloc
LocalFree
TerminateThread
WideCharToMultiByte
GetUserDefaultLCID
AreFileApisANSI
IsBadReadPtr
LoadLibraryA
LoadLibraryW
CreateEventA
CreateEventW
GetDateFormatA
GetDateFormatW
GetTimeFormatA
GetTimeFormatW
FormatMessageA
GetLocaleInfoW
WaitForMultipleObjects
GetLastError
user32
RedrawWindow
GetDC
SetRect
ReleaseDC
GetSysColor
FillRect
CallWindowProcW
IsWindowVisible
KillTimer
SetTimer
InvalidateRect
DrawIcon
DrawAnimatedRects
GetWindowRect
MapWindowPoints
SetWindowPos
GetSystemMetrics
GetClientRect
SystemParametersInfoA
SetForegroundWindow
UpdateWindow
GetDlgItem
IsWindowEnabled
GetFocus
EnableWindow
SetFocus
SendMessageA
DefDlgProcW
DefDlgProcA
GetWindowLongA
SetWindowLongA
wsprintfW
GetMessageA
PostMessageA
MsgWaitForMultipleObjects
PeekMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
AttachThreadInput
FindWindowA
FindWindowW
SetWindowTextA
SetWindowTextW
WinHelpA
WinHelpW
RegisterWindowMessageA
SetCursor
GetParent
GetUserObjectInformationW
GetThreadDesktop
GetProcessWindowStation
DefWindowProcW
LoadStringA
LoadStringW
FindWindowExW
RegisterWindowMessageW
CreateWindowExA
CreateWindowExW
CreateDialogParamA
CreateDialogParamW
RegisterClassA
RegisterClassW
MessageBoxA
MessageBoxW
SendMessageW
DrawTextA
DrawTextW
FindWindowExA
ShowWindow
EndDialog
DialogBoxParamA
DestroyWindow
DefWindowProcA
BeginPaint
RegisterClassExA
LoadCursorA
LoadIconA
PostQuitMessage
EndPaint
DrawFocusRect
gdi32
SetTextColor
GetTextExtentPointW
GetTextExtentPointA
CreateFontIndirectW
CreateFontIndirectA
SetBkColor
SelectObject
RestoreDC
DeleteObject
GetObjectA
SaveDC
advapi32
RegSetValueExW
GetUserNameA
RegCreateKeyExW
RegCreateKeyExA
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegEnumKeyW
RegEnumKeyA
RegOpenKeyExW
RegOpenKeyExA
OpenProcessToken
OpenThreadToken
RegCloseKey
GetUserNameW
ole32
CoRegisterClassObject
StringFromGUID2
CLSIDFromString
CoInitializeEx
CoInitialize
CoFreeUnusedLibraries
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoRevokeClassObject
ntdll
toupper
strncpy
wcscmp
msvcrt
exit
comctl32
ImageList_ReplaceIcon
ImageList_LoadImageW
ImageList_Draw
InitCommonControlsEx
ImageList_Create
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 436KB - Virtual size: 755KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE