Static task
static1
Behavioral task
behavioral1
Sample
e9fd6342b246e17267b8ce0a5a139e8e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e9fd6342b246e17267b8ce0a5a139e8e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e9fd6342b246e17267b8ce0a5a139e8e_JaffaCakes118
-
Size
99KB
-
MD5
e9fd6342b246e17267b8ce0a5a139e8e
-
SHA1
4a58d01bf07fdff47bb536a7f76cac92bb2d3ee5
-
SHA256
6dc4cf54658cf23efbb6a87112512bfb5e0cf7468f6330f1e1e65a7bea43192c
-
SHA512
1084543b46a0deea34639f12869867211f1ea82a6fc4d06423fbc5043f6b2aefeca6951046d7678ff285220af70617354059026db71ba9e690a0e8fbef810eb5
-
SSDEEP
1536:UhhYzHQxhu1h7evMhuEanToEN+ROqzUDCkmWPVj1B6CnWkiUw4an0FHKrYPkfWQI:U8DQT+7Vhf3NpYt1tWkNNFHKr1WWiJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e9fd6342b246e17267b8ce0a5a139e8e_JaffaCakes118
Files
-
e9fd6342b246e17267b8ce0a5a139e8e_JaffaCakes118.exe windows:4 windows x86 arch:x86
e699ac72ba1a3bf7bf594d622a59d3d1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CopyEnhMetaFileA
GetObjectA
SetPixel
SetBkMode
LineTo
CreateDIBitmap
GetDIBColorTable
GetBitmapBits
BitBlt
CreateCompatibleBitmap
advapi32
RegDeleteValueA
kernel32
CloseHandle
lstrcpynA
ExitProcess
MoveFileA
SizeofResource
GetOEMCP
VirtualAllocEx
HeapAlloc
GetStringTypeA
GetModuleHandleA
GetCurrentThreadId
LoadLibraryA
LoadLibraryExA
FormatMessageA
GetCurrentProcessId
GetCurrentProcess
VirtualAlloc
VirtualQuery
WriteFile
ExitThread
GlobalAddAtomA
comctl32
ImageList_Create
ImageList_GetBkColor
ImageList_DragShowNolock
ImageList_Add
ImageList_Draw
ImageList_Destroy
ImageList_Remove
ImageList_Read
ImageList_Write
ImageList_DrawEx
version
VerFindFileA
VerQueryValueA
shell32
Shell_NotifyIconA
SHGetDesktopFolder
user32
GetDesktopWindow
GetClientRect
EnableScrollBar
GetDCEx
GetLastActivePopup
CharToOemA
BeginPaint
ShowWindow
GetActiveWindow
CreatePopupMenu
CallWindowProcA
GetForegroundWindow
SetTimer
CharLowerBuffA
DispatchMessageW
IsWindowEnabled
EqualRect
DefWindowProcA
MessageBoxA
GetCapture
DispatchMessageA
GetWindow
DrawFrameControl
CheckMenuItem
CharLowerA
GetSysColor
DrawEdge
DefFrameProcA
DefMDIChildProcA
CreateWindowExA
GetMessagePos
DrawIcon
GetMenuState
GetClipboardData
FrameRect
EnableWindow
BeginDeferWindowPos
GetMenuItemInfoA
SetWindowPos
CallNextHookEx
GetCursor
GetDC
RegisterClassA
EnumChildWindows
SetCursor
ShowScrollBar
FillRect
EndDeferWindowPos
CharNextA
IsChild
DrawIconEx
GetMenuStringA
GetSysColorBrush
SetWindowLongA
GetKeyNameTextA
CreateIcon
EndPaint
HideCaret
GetDlgItem
EnumThreadWindows
GetMenuItemCount
ClientToScreen
DeferWindowPos
DrawMenuBar
DrawTextA
TrackPopupMenu
IsMenu
GetMenuItemID
IsWindowVisible
IsDialogMessageA
GetCursorPos
GetClassLongA
GetMenu
GetIconInfo
GetSubMenu
GetScrollPos
GetFocus
GetScrollRange
GetParent
GetWindowTextA
GetKeyState
GetPropA
SystemParametersInfoA
EnumWindows
GetScrollInfo
CreateMenu
FindWindowA
SetWindowTextA
EnableMenuItem
msvcrt
swprintf
fabs
tolower
log
malloc
wcscspn
strlen
cos
log10
memmove
ceil
calloc
Sections
CODE Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 1024B - Virtual size: 838B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE