Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_04c783356a9cff8b6c0cf1780682a51c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_04c783356a9cff8b6c0cf1780682a51c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_04c783356a9cff8b6c0cf1780682a51c
-
Size
252KB
-
MD5
04c783356a9cff8b6c0cf1780682a51c
-
SHA1
a9a67ecc38841cb668f10e9de85e42d0babef090
-
SHA256
1944eec2b796edcc86ce0d6725c4e58b4fb0ad79f3abb8473a7703deafaf92e8
-
SHA512
e20be8ec278de117f6bd37849dd5e3866dcb268821e2898f245896726c9379293d42f1a3980deea7c585112a31bcaa596a0454760cb9e1e2317ebaff89f95342
-
SSDEEP
6144:fId079u0236C/DkLqMAo74a3l/wOjjf0jF1zLYpH/XRe:wEALkuMAojYO30jFOpH/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_04c783356a9cff8b6c0cf1780682a51c
Files
-
JaffaCakes118_04c783356a9cff8b6c0cf1780682a51c.exe windows:4 windows x86 arch:x86
8e4ffada0d4bb5946be829009347cc79
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
lstrcpynA
lstrlenA
GetLastError
GetFullPathNameA
GetFileAttributesA
lstrcpynW
lstrlenW
GetFileAttributesW
FreeLibrary
MultiByteToWideChar
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
Sleep
LocalFree
GetTickCount
GetModuleFileNameW
GetVersionExW
LocalAlloc
LoadLibraryW
GetLocalTime
GetProcAddress
LoadLibraryA
user32
EnableWindow
SetForegroundWindow
SendMessageW
GetMenuState
ShowCaret
CreateAcceleratorTableW
SetTimer
GetMenuItemID
GetMenuInfo
PostMessageW
GetCapture
CreateDesktopA
GetSubMenu
wsprintfA
CreateDialogIndirectParamW
LoadMenuW
AppendMenuA
CharPrevA
SetWindowTextW
SetDlgItemInt
TrackPopupMenuEx
GetForegroundWindow
GetSysColor
TrackPopupMenu
IsWindow
LoadIconA
wsprintfW
GetDlgItemTextA
GetMessageW
DialogBoxParamA
AdjustWindowRect
GetCursorPos
CopyIcon
MonitorFromPoint
CreateDialogParamA
GetKeyState
SetCursor
CharNextA
SetDlgItemTextW
GetDCEx
advapi32
RegCreateKeyExW
RegEnumKeyW
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegDeleteKeyW
RegDeleteKeyA
shell32
SHGetDesktopFolder
security
SealMessage
CompleteAuthToken
gdi32
CreatePolygonRgn
CreateScalableFontResourceW
StretchDIBits
GetTextExtentPointA
SelectBrushLocal
CreateFontIndirectExA
AddFontResourceW
Sections
.text Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xSHu Size: 2KB - Virtual size: 476KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xCaD Size: 104KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.G Size: 4KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.oBZ Size: 5KB - Virtual size: 464KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 379KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Pi Size: 105KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ