Static task
static1
Behavioral task
behavioral1
Sample
be368cc04c3fa4ac323c9797f76b3489_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
be368cc04c3fa4ac323c9797f76b3489_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
be368cc04c3fa4ac323c9797f76b3489_JaffaCakes118
-
Size
276KB
-
MD5
be368cc04c3fa4ac323c9797f76b3489
-
SHA1
9fb1ffdecf529b387d679c2f9455cdafca5adafe
-
SHA256
1cbe3999f4aca64a055eafdeda3fe8ca529a17b533d838198f3c6ebdcd7b1e40
-
SHA512
81da1f7d65505193ede3374a11940bf2f2d656c5cd1a19e7a3e8184af6dc07d77b3dd465194e2f997822aca8e8315dcc0115c9d0f8ad8eb6f5ee2cdc8e5dee2c
-
SSDEEP
6144:nAIIkQOK3yb+Po/BdjUSyEer6JNqhvyR73yavQIa3:OrOgIA8tUSyEaaNqNY7zvQ/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource be368cc04c3fa4ac323c9797f76b3489_JaffaCakes118
Files
-
be368cc04c3fa4ac323c9797f76b3489_JaffaCakes118.exe windows:5 windows x86 arch:x86
c9920318771bb5a3c47e5450e0aed411
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
TrackPopupMenu
ValidateRect
GetScrollPos
InvalidateRgn
DeleteMenu
IsZoomed
LoadImageW
DialogBoxParamA
IsRectEmpty
CreateWindowExW
GetSubMenu
GetFocus
GetCursorPos
MonitorFromPoint
GetClipboardData
GetDlgCtrlID
RegisterShellHookWindow
GetKBCodePage
shell32
SHGetPathFromIDListA
ole32
OleDuplicateData
CreateILockBytesOnHGlobal
advapi32
LookupPrivilegeValueW
RegCreateKeyW
gdi32
CreatePen
CreateFontIndirectW
DeleteObject
netapi32
NetWkstaTransportAdd
kernel32
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
LoadLibraryA
GetLocaleInfoA
EnterCriticalSection
GetProcessVersion
OpenProcess
LocalCompact
GetCurrentProcessId
ClearCommError
FlushFileBuffers
UnmapViewOfFile
GetDiskFreeSpaceA
GetEnvironmentStringsW
LoadResource
SetUnhandledExceptionFilter
SetLastError
GetDriveTypeA
GetDiskFreeSpaceExW
BeginUpdateResourceW
GetLogicalDriveStringsW
CreateDirectoryA
CreateProcessW
FatalAppExitA
GetThreadContext
DosDateTimeToFileTime
VirtualAlloc
GetFileSize
CreateFileW
VirtualQuery
HeapAlloc
GetCommandLineA
GetStartupInfoA
DeleteCriticalSection
LeaveCriticalSection
HeapFree
VirtualFree
HeapReAlloc
HeapCreate
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 338KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 219KB - Virtual size: 219KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ