Static task
static1
Behavioral task
behavioral1
Sample
ec4d47ccef28639dc97d781e4e5d7892_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec4d47ccef28639dc97d781e4e5d7892_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
ec4d47ccef28639dc97d781e4e5d7892_JaffaCakes118
-
Size
110KB
-
MD5
ec4d47ccef28639dc97d781e4e5d7892
-
SHA1
00ab940d65e2989ed9c522fe3c8984ae71c407a1
-
SHA256
2c755e4e25d479c3fdf390bfc1b514e2463c39bedf968a2a7a2cb86c0e459baa
-
SHA512
ef216a731cccf73f072bbd4b228cd08f67681bb6b440d2307aa4eea00e19ab4cb3c2e3cfc38b423287252eaf41f689e44fd55b3439b8a678044a231451b0e933
-
SSDEEP
3072:qTLituRA0m03jPhpwPK8SyZm6WF/ZR/9YB0c:10FP7mBSl6eR/9Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ec4d47ccef28639dc97d781e4e5d7892_JaffaCakes118
Files
-
ec4d47ccef28639dc97d781e4e5d7892_JaffaCakes118.exe windows:4 windows x86 arch:x86
892cc62a9cd22e645e3eb804a60ab5e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
SafeArrayCreate
SafeArrayGetUBound
RegisterTypeLib
SafeArrayUnaccessData
OleLoadPicture
VariantChangeType
user32
GetWindowThreadProcessId
EndPaint
GetCapture
OpenClipboard
CharLowerBuffA
MessageBeep
SetClipboardData
DrawIconEx
ActivateKeyboardLayout
LoadStringA
InsertMenuItemA
DestroyWindow
ChildWindowFromPoint
SetWindowLongW
SetClassLongA
SetScrollRange
GetKeyState
FindWindowA
MsgWaitForMultipleObjects
IsWindowEnabled
GetMenuItemID
DrawMenuBar
GetActiveWindow
GetKeyboardState
GetCursor
WindowFromPoint
IsIconic
SetPropA
GetMenuItemInfoA
GetClipboardData
CloseClipboard
SetTimer
DestroyMenu
GetWindowDC
IsRectEmpty
ScreenToClient
SendMessageA
PtInRect
GetMenu
GetParent
TranslateMDISysAccel
GetTopWindow
CallNextHookEx
UpdateWindow
SetParent
ReleaseDC
RegisterClassA
GetClassLongA
SystemParametersInfoA
GetMenuItemCount
GetDC
GetWindowLongA
GetWindowTextA
GetClassInfoA
DestroyCursor
SetWindowTextA
BeginPaint
IsZoomed
GetClientRect
IsWindowVisible
GetClassNameA
CharLowerA
GetCursorPos
OffsetRect
GetKeyboardLayoutList
AdjustWindowRectEx
GetLastActivePopup
EnumChildWindows
LoadCursorA
SetRect
SetWindowsHookExA
GetKeyboardLayout
DrawTextA
GetSysColorBrush
DrawAnimatedRects
GetPropA
CreatePopupMenu
CharToOemA
GetSysColor
MoveWindow
IsDialogMessageW
DispatchMessageW
DrawEdge
GetWindowPlacement
GetWindowLongW
GetFocus
CharNextA
GetScrollRange
GetDCEx
GetScrollPos
WaitMessage
EnableMenuItem
EmptyClipboard
UnregisterClassA
RegisterWindowMessageA
GetMenuStringA
IsWindow
GetForegroundWindow
MessageBoxA
ole32
WriteClassStm
MkParseDisplayName
CoGetMalloc
CoReleaseMarshalData
CreateBindCtx
CoCreateInstanceEx
CoRegisterClassObject
CoTaskMemFree
CoRevokeClassObject
CoDisconnectObject
version
VerQueryValueA
GetFileVersionInfoA
VerFindFileA
shell32
SHGetFileInfoA
Shell_NotifyIconA
DragQueryFileA
gdi32
GetBitmapBits
SelectPalette
CreateBitmap
SetBkColor
SaveDC
GetPaletteEntries
CreatePalette
BitBlt
GetDIBits
kernel32
SetEvent
ExitProcess
GetModuleHandleA
GetLocalTime
VirtualAllocEx
Sleep
GetFileType
GetLastError
lstrlenA
GetCPInfo
lstrcatA
ExitThread
LockResource
LocalFree
GlobalAlloc
WriteFile
GetProcAddress
Sections
CODE Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE