Static task
static1
Behavioral task
behavioral1
Sample
f3f2db53df6a8bfacad1f9505974507b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f3f2db53df6a8bfacad1f9505974507b_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f3f2db53df6a8bfacad1f9505974507b_JaffaCakes118
-
Size
13.8MB
-
MD5
f3f2db53df6a8bfacad1f9505974507b
-
SHA1
af188ac402c82241975cb6ff17faf8314fd6c80d
-
SHA256
610cb49791e670b6896af06ee549ee7aa56979e10e0b353044949ccb3ad42c7e
-
SHA512
a1ec956694c021bb4a89c1b0543e52462461e2ffcc70f04ea29a3f4c509784e65997602835df1867905e2cc466c1f8bd8d7755abee8d3a33ce02ab40a38426e4
-
SSDEEP
49152:cjrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrn:W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource f3f2db53df6a8bfacad1f9505974507b_JaffaCakes118
Files
-
f3f2db53df6a8bfacad1f9505974507b_JaffaCakes118.exe windows:5 windows x86 arch:x86
3b770c930332f681fc31290486bd58a3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
DllRegisterServer
FindExecutableA
Shell_NotifyIconW
StrRChrW
SHGetDataFromIDListW
DragQueryPoint
ShellExecuteA
SHGetDataFromIDListW
DragQueryFileW
ShellExecuteA
SHGetFolderPathA
Shell_NotifyIconW
comsvcs
RecycleSurrogate
CoLoadServices
CoLoadServices
RecycleSurrogate
SafeRef
CoLoadServices
RecycleSurrogate
RecycleSurrogate
CoEnterServiceDomain
cmpbk32
PhoneBookCopyFilter
PhoneBookLoad
PhoneBookLoad
PhoneBookEnumCountries
PhoneBookLoad
user32
LoadIconW
LoadIconW
LoadIconW
PeekMessageA
PostMessageA
LoadIconW
GetDlgItemTextW
LoadCursorW
GetDlgItemTextW
GetPropW
PostMessageA
GetMessageW
GetClassLongA
DialogBoxParamW
FindWindowA
CreateDesktopA
GetDlgItemTextW
GetPropW
CreateDesktopA
DialogBoxParamW
LoadMenuW
DispatchMessageA
LoadCursorW
DialogBoxParamW
advapi32
RegSaveKeyW
CryptSignHashW
RegSaveKeyW
RegLoadKeyW
RegUnLoadKeyW
RegRestoreKeyA
OpenServiceA
RegOpenKeyW
RegOpenKeyW
LogonUserW
LogonUserW
LogonUserW
RegOpenKeyW
InitializeSid
shlwapi
UrlIsW
UrlGetLocationW
UrlCompareW
UrlIsW
UrlCombineA
UrlCompareW
PathIsURLW
PathIsRootA
PathIsRootA
UrlGetPartA
PathIsRootA
UrlCanonicalizeA
UrlUnescapeA
PathIsRootA
msimg32
AlphaBlend
TransparentBlt
TransparentBlt
AlphaBlend
AlphaBlend
DllInitialize
AlphaBlend
GradientFill
kernel32
VirtualFree
AddAtomW
LoadLibraryA
OpenFileMappingA
TlsSetValue
LoadLibraryW
WriteConsoleA
LoadLibraryA
HeapAlloc
AddAtomW
FindFirstFileA
LoadLibraryW
GetCurrentProcess
OpenFileMappingA
MoveFileExA
GetCurrentDirectoryA
GetShortPathNameA
GetSystemTime
FindAtomA
AllocConsole
FindFirstFileA
VirtualAlloc
LoadLibraryW
GetCurrentDirectoryA
CreateSemaphoreA
WaitForSingleObject
FindAtomA
RemoveDirectoryA
WaitForSingleObject
HeapAlloc
Sections
.text Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.pdata Size: 77KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fdata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_WRITE
.relo Size: 13.7MB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ