Static task
static1
Behavioral task
behavioral1
Sample
f4c4780aa40a2d68b352796857931b09_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f4c4780aa40a2d68b352796857931b09_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f4c4780aa40a2d68b352796857931b09_JaffaCakes118
-
Size
71KB
-
MD5
f4c4780aa40a2d68b352796857931b09
-
SHA1
9b89a290831d23148cbb3bda94c942fb5ec0cfbf
-
SHA256
f164a1229650dc98f935bf56d5b0c93589d5c70bf6f0c9b3679c64a6cd118504
-
SHA512
beb45f4d04914dbbb9a4c75eae0391609f5f02f98f39bbb5e89692c989b29df42bd4df8ca50d8a7993b02054999888fa7b8cc9de697676e9adb521c76b6dbb1c
-
SSDEEP
1536:E4S3UqZAR1LffTpZB2V/Gm4xZSFA7afocJbsjT0cZ8vm9dt+L0rLldsz/hYQ1iq1:EWqZW1XdZoB2qXforT0cZ8+okD2Riq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f4c4780aa40a2d68b352796857931b09_JaffaCakes118
Files
-
f4c4780aa40a2d68b352796857931b09_JaffaCakes118.exe windows:5 windows x86 arch:x86
7e5c976567537f4b0fb66f4f7b12d31f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SystemParametersInfoA
UnhookWindowsHook
SetWindowLongA
PrivateExtractIconsA
EnumPropsA
MonitorFromRect
RemovePropW
SetCursor
GetDialogBaseUnits
DrawTextW
SetUserObjectSecurity
GetCaretBlinkTime
GetMenuStringW
wsprintfA
SetActiveWindow
SetMessageQueue
UpdateWindow
DefWindowProcW
DdeDisconnectList
WINNLSGetEnableStatus
CheckMenuRadioItem
UnregisterClassW
GetSysColor
LoadKeyboardLayoutW
ToAsciiEx
LookupIconIdFromDirectory
GetOpenClipboardWindow
SetWindowsHookExA
GetPropW
ToAscii
GetIconInfo
MessageBoxExW
UnlockWindowStation
OpenIcon
AppendMenuA
CreateWindowExA
OemToCharBuffW
NotifyWinEvent
GetClassInfoExW
CliImmSetHotKey
IsHungAppWindow
CreateMenu
FindWindowA
PackDDElParam
GetMenuState
CharPrevW
ArrangeIconicWindows
kernel32
GetLastError
AddAtomW
SetCurrentDirectoryA
GlobalDeleteAtom
GetSystemPowerStatus
GetSystemDirectoryA
WaitForMultipleObjectsEx
PurgeComm
VirtualProtect
WriteFileEx
FreeLibrary
CreateTimerQueueTimer
GetVolumeInformationW
gdi32
FloodFill
GdiSwapBuffers
ExtSelectClipRgn
EngMultiByteToUnicodeN
CreateBitmapIndirect
GdiEntry11
GetTextExtentExPointWPri
GdiEntry2
WidenPath
SetAbortProc
PlayMetaFile
UnloadNetworkFonts
EngLoadModule
GdiConvertAndCheckDC
BRUSHOBJ_ulGetBrushColor
GetEUDCTimeStampExW
GdiStartDocEMF
GdiSetLastError
DeleteMetaFile
PaintRgn
GetEUDCTimeStamp
CreateEnhMetaFileA
EngPlgBlt
GetTextExtentPointW
GetGlyphOutline
GdiAddGlsBounds
XFORMOBJ_iGetXform
GdiFixUpHandle
CreateDCA
GdiGetCharDimensions
CreateHatchBrush
SetDIBitsToDevice
GetTransform
GetBoundsRect
GetDIBColorTable
GetSystemPaletteUse
SetMagicColors
GetClipBox
PolyBezierTo
ExtCreatePen
GetGlyphIndicesA
SetRelAbs
EndFormPage
AddFontResourceA
comdlg32
FindTextA
GetFileTitleA
ChooseFontW
ReplaceTextA
ReplaceTextW
dwOKSubclass
GetOpenFileNameW
ChooseColorW
FindTextW
CommDlgExtendedError
PrintDlgW
GetSaveFileNameA
ChooseColorA
GetOpenFileNameA
dwLBSubclass
Ssync_ANSI_UNICODE_Struct_For_WOW
PageSetupDlgA
PageSetupDlgW
GetFileTitleW
psapi
GetProcessMemoryInfo
GetModuleBaseNameA
GetDeviceDriverFileNameW
GetWsChanges
EnumProcesses
GetDeviceDriverBaseNameA
EmptyWorkingSet
GetModuleFileNameExW
GetDeviceDriverBaseNameW
EnumDeviceDrivers
QueryWorkingSet
GetModuleInformation
GetModuleFileNameExA
EnumProcessModules
comctl32
GetMUILanguage
ImageList_DragMove
ImageList_DrawEx
DrawStatusText
InitCommonControls
ImageList_Read
CreatePropertySheetPage
GetEffectiveClientRect
ImageList_Merge
CreatePropertySheetPageA
ImageList_Add
DrawStatusTextW
ImageList_AddIcon
ImageList_GetBkColor
UninitializeFlatSB
ImageList_Destroy
ImageList_DragLeave
ImageList_GetImageCount
ImageList_GetIcon
FlatSB_SetScrollRange
ImageList_AddMasked
ImageList_GetDragImage
FlatSB_SetScrollInfo
LBItemFromPt
Sections
.text Size: 5KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 59KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE