Static task
static1
Behavioral task
behavioral1
Sample
f5e7ec0d384a0ad6cefaafa94be26c53_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f5e7ec0d384a0ad6cefaafa94be26c53_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f5e7ec0d384a0ad6cefaafa94be26c53_JaffaCakes118
-
Size
356KB
-
MD5
f5e7ec0d384a0ad6cefaafa94be26c53
-
SHA1
4bf0fdfc155c4e91ce7678970478c7ff4cba7b10
-
SHA256
d3aaedf1312ede541ab4febbeb2ce517a5a879f57be929f50e8215e6eb0e5f99
-
SHA512
9995501230b7ecefc2f9b0b393de094c854d83b70b0e9ad3608ea00ff4175e31bec68710ff8bd9812be6fa2cdd8eab22d18c54ecc212b2fefa76d76a71d9ea4c
-
SSDEEP
6144:9y3FVMfI4S541tgdRSV4nPMiTu6HxpIdcjMrLdz8DZeGIto7R5Gnb:9y3FaI541tgdRSeumpz42DFIt2an
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f5e7ec0d384a0ad6cefaafa94be26c53_JaffaCakes118
Files
-
f5e7ec0d384a0ad6cefaafa94be26c53_JaffaCakes118.exe windows:4 windows x86 arch:x86
0f952a5ec79d35c5acbd98e2e80449db
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
shell32
SHGetSpecialFolderLocation
user32
GetPropA
GetDesktopWindow
DestroyCursor
FindWindowA
MessageBoxA
RedrawWindow
GetWindowThreadProcessId
GetCursorPos
MessageBeep
MapVirtualKeyA
ShowScrollBar
SystemParametersInfoA
PtInRect
DrawTextA
RemoveMenu
GetWindowPlacement
GetWindowLongW
SetPropA
DrawAnimatedRects
SetTimer
GetSysColor
OffsetRect
CloseClipboard
SetActiveWindow
OpenClipboard
GetClassInfoA
GetKeyboardLayoutNameA
MapWindowPoints
GetDCEx
GetParent
WaitMessage
GetMenuStringA
ChildWindowFromPoint
GetWindowDC
GetFocus
ClientToScreen
GetKeyNameTextA
PeekMessageW
EnumChildWindows
IsRectEmpty
MsgWaitForMultipleObjects
SetWindowTextA
CallNextHookEx
SetScrollPos
SetWindowPos
SetCapture
InvalidateRect
GetLastActivePopup
GetKeyboardLayout
ActivateKeyboardLayout
GetSubMenu
TranslateMDISysAccel
LoadIconA
SetForegroundWindow
GetClassLongA
InflateRect
SetScrollInfo
TrackPopupMenu
SetMenuItemInfoA
GetMenuItemID
SetCursor
ScreenToClient
UnregisterClassA
GetKeyboardType
DestroyIcon
SetWindowLongA
UpdateWindow
LoadStringA
ShowWindow
SetClipboardData
CharNextA
CharToOemA
comctl32
ImageList_Add
ImageList_DragShowNolock
ImageList_GetBkColor
advapi32
RegQueryInfoKeyA
RegDeleteValueA
GetUserNameA
oleaut32
VariantChangeType
version
VerFindFileA
gdi32
GetDIBits
GetDCOrgEx
GetPixel
GetBitmapBits
BitBlt
SetBkColor
CreateBitmap
RestoreDC
kernel32
LoadLibraryA
VirtualAlloc
ExitProcess
GetVersionExA
ExitThread
GetModuleHandleA
lstrlenA
GetCommandLineW
IsBadReadPtr
LoadLibraryExA
LocalAlloc
GetCommandLineA
GetProcAddress
GetACP
Sections
.text Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 283KB - Virtual size: 283KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.RSRC0 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RSRC6 Size: 1024B - Virtual size: 947B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.RSRC2 Size: 512B - Virtual size: 47B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.RSRC8 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RSRC5 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.RSRC1 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 992B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ