Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_17ae1518ba5f5f91df0f162f7e1f3f00.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_17ae1518ba5f5f91df0f162f7e1f3f00.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_17ae1518ba5f5f91df0f162f7e1f3f00
-
Size
246KB
-
MD5
17ae1518ba5f5f91df0f162f7e1f3f00
-
SHA1
18035001807c2fc0dc6a8b4dca67c009ba9adb29
-
SHA256
7e1e574949b300ff6c56df4711e1438fa545c56266509f30f7849c159b935915
-
SHA512
084ce795de802be88997923f2d87612f51c322c8cf36bb36e8c005fe8a43f7bd73d48a1a56848d9a5c86b7fad258428d474b5c371b673c122522221ad08e2766
-
SSDEEP
6144:x4dyaDgSqCwOAua7kwrZrSV6OCQB86jEVUKCnY0Iu:x4lMH3uaJ62EEVU6u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_17ae1518ba5f5f91df0f162f7e1f3f00
Files
-
JaffaCakes118_17ae1518ba5f5f91df0f162f7e1f3f00.exe windows:4 windows x86 arch:x86
45f637f018279ea291645a4588a8db71
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
GetVolumeInformationW
FindAtomW
GetProcAddress
AddAtomW
LoadLibraryExA
WinExec
GetDiskFreeSpaceA
DosDateTimeToFileTime
GetThreadLocale
GetShortPathNameA
GetCurrentDirectoryW
OpenMutexA
ExitProcess
GetAtomNameA
lstrlenA
GetTimeFormatW
HeapCreate
AddAtomA
GetStartupInfoA
GetCurrentDirectoryA
LocalFree
lstrcmpW
user32
SetWindowTextA
CharPrevA
ShowCursor
GetCaretPos
WaitForInputIdle
IsMenu
UpdateLayeredWindow
DestroyIcon
CreateWindowExW
GetDlgItemTextA
SetWindowTextW
CreateWindowExA
WaitMessage
UnregisterClassA
keybd_event
InsertMenuA
SetMenu
mouse_event
MessageBoxW
DestroyCursor
SetParent
EnableMenuItem
RemoveMenu
SetDlgItemTextW
DialogBoxParamW
GetSysColorBrush
gdi32
GetRasterizerCaps
CreateSolidBrush
CreateBitmapIndirect
CreateScalableFontResourceA
CreateRoundRectRgn
CreateFontW
RemoveFontResourceA
CreateDIBPatternBrushPt
CreateFontA
GetMetaFileA
CreateBitmap
CreateScalableFontResourceW
GetObjectType
GetEnhMetaFilePixelFormat
CreatePolygonRgn
CreateICW
CreateMetaFileA
CreateEllipticRgn
CreatePolyPolygonRgn
CreateICA
GetTextExtentPointA
GetTextExtentPointW
advapi32
RegQueryValueW
RegCreateKeyExA
RegSetValueW
RegDeleteValueW
RegEnumValueA
RegQueryValueA
RegOpenKeyW
RegFlushKey
RegSetValueA
RegReplaceKeyW
RegDeleteKeyA
shell32
ExtractAssociatedIconExW
StrChrA
Shell_NotifyIconW
SHCreateDirectoryExW
ShellExecuteW
StrNCmpIA
Shell_NotifyIconA
StrChrW
SHCreateDirectoryExA
StrNCmpIW
StrStrW
SHBrowseForFolderA
ExtractIconW
ws2_32
WSAEnumProtocolsA
WSACreateEvent
htonl
htons
WSAEventSelect
WSAIoctl
closesocket
recvfrom
WSAGetLastError
getnameinfo
getprotobynumber
WSASendTo
connect
inet_ntoa
getprotobyname
select
urlmon
CoInstall
CompareSecurityIds
CoGetClassObjectFromURL
WriteHitLogging
CDLGetLongPathNameW
HlinkSimpleNavigateToMoniker
DllUnregisterServer
URLDownloadToCacheFileA
URLOpenStreamW
HlinkNavigateString
Extract
GetComponentIDFromCLSSPEC
CoInternetParseUrl
ObtainUserAgentString
IsLoggingEnabledW
CreateAsyncBindCtx
AsyncGetClassBits
URLDownloadToFileW
URLOpenBlockingStreamA
oledlg
OleUIConvertW
OleUIUpdateLinksA
OleUIObjectPropertiesW
OleUIAddVerbMenuW
OleUICanConvertOrActivateAs
Sections
.uWZ Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.HzMrF Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cJ Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.g Size: 1KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.BvW Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xl Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cb Size: 11KB - Virtual size: 310KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FK Size: 5KB - Virtual size: 495KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ