Static task
static1
Behavioral task
behavioral1
Sample
e84cddd397d2327801e6d9ba69dd932a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e84cddd397d2327801e6d9ba69dd932a_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e84cddd397d2327801e6d9ba69dd932a_JaffaCakes118
-
Size
216KB
-
MD5
e84cddd397d2327801e6d9ba69dd932a
-
SHA1
03d13cb0af5235ab03b7c95edbca4f8722dcabfc
-
SHA256
2689d120d9843004bfa93187d0bc637522fab4a8fd76fea883196e3410e6ece3
-
SHA512
9b46f6b2aeadc5d163d65086a85e103ff71710b673ab919bdb456369ce5105830c586de360d26924a1dad300b7e8f6f811f8f3d0fc8d1441b9b893a9640e6c65
-
SSDEEP
3072:2nQkSO7sPHS7+zENyikP8VRU7yZcy+4y+9hEL2pNF7PPW113YlMWpqcPSYlZpbNz:qp7GA+wNlVRUu0ye0DLU1s/pqoSA1sV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e84cddd397d2327801e6d9ba69dd932a_JaffaCakes118
Files
-
e84cddd397d2327801e6d9ba69dd932a_JaffaCakes118.exe windows:4 windows x86 arch:x86
e88ba0512c5cc14fcbaf0c216a1661f6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyExA
RegDeleteValueA
RegLoadKeyA
user32
MapWindowPoints
RedrawWindow
SendMessageA
ScrollWindow
PeekMessageA
RegisterWindowMessageA
LoadCursorA
LoadKeyboardLayoutA
OemToCharA
OpenClipboard
LoadBitmapA
PtInRect
RemoveMenu
OffsetRect
RegisterClassA
ScreenToClient
ReleaseDC
PeekMessageW
ReleaseCapture
RemovePropA
RegisterClipboardFormatA
SendMessageW
LoadStringA
MessageBoxA
MapVirtualKeyA
SetActiveWindow
PostQuitMessage
MessageBeep
LoadIconA
PostMessageA
gdi32
CreatePenIndirect
SetTextColor
GetBitmapBits
GetCurrentPositionEx
CreateFontIndirectA
CreatePalette
CreateDIBitmap
ole32
CoReleaseMarshalData
OleCreateStaticFromData
oleaut32
SysStringLen
RegisterTypeLib
SafeArrayCreate
VariantCopyInd
SafeArrayGetUBound
kernel32
LocalReAlloc
lstrcatA
lstrcmpA
lstrlenA
LoadLibraryA
GetCommandLineA
LocalAlloc
MoveFileExA
lstrcpynA
IsBadReadPtr
VirtualFree
GetLastError
ExitThread
lstrcmpiA
VirtualAlloc
GetVersionExA
GetModuleHandleA
WideCharToMultiByte
WriteFile
LocalFree
SizeofResource
WaitForSingleObject
HeapDestroy
ExitProcess
lstrcpyA
GetProcAddress
VirtualQuery
MoveFileA
MulDiv
LoadLibraryExA
shlwapi
SHStrDupA
PathGetCharTypeA
PathIsContentTypeA
SHGetValueA
SHSetValueA
PathFileExistsA
shell32
SHGetFileInfoA
SHGetSpecialFolderLocation
DragQueryFileA
Shell_NotifyIconA
SHGetFolderPathA
comctl32
ImageList_GetBkColor
ImageList_DragShowNolock
ImageList_Read
ImageList_Add
ImageList_Destroy
ImageList_Draw
ImageList_Write
ImageList_Create
ImageList_DrawEx
ImageList_Remove
msvcrt
strlen
sqrt
tolower
wcsncmp
_acmdln
wcstol
malloc
time
version
GetFileVersionInfoA
VerFindFileA
Sections
.text Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc9 Size: 1024B - Virtual size: 654B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc2 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc8 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc4 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc0 Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ