Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_60429f8190360a3b6c895d2d0c87bddd.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_60429f8190360a3b6c895d2d0c87bddd.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_60429f8190360a3b6c895d2d0c87bddd
-
Size
330KB
-
MD5
60429f8190360a3b6c895d2d0c87bddd
-
SHA1
ee9a358af5a68d5a398df819122503e19b136de0
-
SHA256
6d0193e7f1069a3b4639a6406590e8515f1a3d03d4a43a0d21756666d54e37de
-
SHA512
ceaa2c3ecaf4a16ad56b5dff85a71db5a809d04962da77d6f798ef52f35e75bf7074b1b184ada09641f74cc091da841df44f811482ff769fb963960805ad5079
-
SSDEEP
6144:qkG3Sd5/QqsXzSIN8GQH29HcohpgaqZK9zHGQ7DXQccckz:ECnsOCZhraQ7D4z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_60429f8190360a3b6c895d2d0c87bddd
Files
-
JaffaCakes118_60429f8190360a3b6c895d2d0c87bddd.exe windows:5 windows x86 arch:x86
0dde20e7a81859a6cc72e0ec0d8092fb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_SYSTEM
Imports
kernel32
GetStringTypeW
MultiByteToWideChar
LCMapStringW
HeapReAlloc
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
Sleep
RtlUnwind
HeapFree
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
HeapAlloc
GetModuleFileNameW
GetStdHandle
WriteFile
InterlockedDecrement
GetCurrentThreadId
SetLastError
FindResourceA
LoadResource
LockResource
SizeofResource
HeapCreate
GetProcAddress
WaitForSingleObject
CreateEventA
EnumDateFormatsA
GetVersion
GetCurrentThread
GetLastError
CloseHandle
GetCurrentProcessId
LoadLibraryA
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
LoadLibraryW
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
user32
GetSysColor
GetDlgItem
GetClientRect
EnableMenuItem
GetMenu
GetDC
GetSubMenu
CopyImage
DrawFrameControl
SetWindowPos
CopyRect
FillRect
DefMDIChildProcA
DrawMenuBar
CreateWindowExA
SendMessageA
SetFocus
PostQuitMessage
MoveWindow
DefWindowProcA
IsClipboardFormatAvailable
SetWindowTextA
MessageBoxA
SetRect
UnionRect
GetWindowTextA
IsDlgButtonChecked
CheckDlgButton
GetClassNameW
UpdateWindow
GetSystemMetrics
GetWindowRect
gdi32
CreateCompatibleBitmap
SelectObject
DeleteDC
GetObjectA
DeleteObject
CreateSolidBrush
CreateCompatibleDC
advapi32
LsaAddAccountRights
LsaRemoveAccountRights
AllocateAndInitializeSid
InitializeSecurityDescriptor
SetNamedSecurityInfoA
OpenThreadToken
GetTokenInformation
ole32
CreateStreamOnHGlobal
CoGetMalloc
oleaut32
SafeArrayCreateVectorEx
shlwapi
StrToIntExA
gdiplus
GdipSaveImageToFile
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdiplusStartup
powrprof
ReadProcessorPwrScheme
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pave Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nata Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tasa Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ