Static task
static1
Behavioral task
behavioral1
Sample
45193536497856842273bcf3ba3eed80_JaffaCakes118.exe
Resource
win10-20240404-en
General
-
Target
45193536497856842273bcf3ba3eed80_JaffaCakes118
-
Size
360KB
-
MD5
45193536497856842273bcf3ba3eed80
-
SHA1
9936812c27e92c8f7f7183ed3a8730ea1c6e167b
-
SHA256
9bf59f52f58052e0644fc5d0a8e9efcc8b7db586a365bd8611228c42ed4d0332
-
SHA512
3ea4cb9916f01b00d7dd73fef6a9006d1c521a225037a44a136991d98db1a0abb74fbc2a09dd2905e2404ca2956382dbb274e346e84be99bdb0377a3ca44f785
-
SSDEEP
6144:gZtBZh5vTOAWJx4u1l05Lpm+SemsrbK9XbgwJU2WWIBReISOuO8I:Qn7vSr4+sLwRnXbg4U2WWyN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 45193536497856842273bcf3ba3eed80_JaffaCakes118
Files
-
45193536497856842273bcf3ba3eed80_JaffaCakes118.exe windows:4 windows x86 arch:x86
3bf1584aba50555518bfd6fefbbc402c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreatePipe
GetCurrentProcessId
BackupWrite
GetStringTypeA
GetStartupInfoA
GetModuleHandleA
advapi32
SetSecurityDescriptorGroup
CreateServiceA
ImpersonateSelf
CreateProcessAsUserA
GetSecurityDescriptorDacl
user32
GetWindowLongW
SetWindowLongA
SetTimer
CreateDialogIndirectParamW
MapVirtualKeyA
OffsetRect
KillTimer
CharPrevA
DdeFreeStringHandle
GetDC
GetClassNameA
GetClipboardViewer
RegisterClipboardFormatW
DrawTextA
FindWindowExW
IsCharAlphaW
TrackPopupMenu
LoadBitmapA
SendDlgItemMessageW
CharLowerW
PtInRect
TranslateAcceleratorW
DestroyCursor
DispatchMessageW
GetDlgItemTextW
SetWindowTextW
DdeConnect
SetWindowTextA
GetClipCursor
PostMessageW
GetMenuItemCount
GetCapture
IsWindowEnabled
CharUpperA
GetProcessWindowStation
LoadImageA
GetSysColorBrush
VkKeyScanExA
CopyImage
SendInput
CharLowerA
ChildWindowFromPointEx
DrawTextW
ChangeClipboardChain
GetClipboardFormatNameW
LoadBitmapW
AppendMenuW
DrawFrameControl
CloseClipboard
DrawIconEx
LoadIconA
MapWindowPoints
GetSystemMetrics
DeferWindowPos
WinHelpA
SetCursor
IsZoomed
BeginDeferWindowPos
GetKeyboardLayoutList
LoadCursorA
IsChild
InsertMenuW
PostMessageA
SetWindowPlacement
WindowFromPoint
SetCapture
GetMessageA
CopyAcceleratorTableW
DrawTextExA
FindWindowW
TrackPopupMenuEx
SetScrollPos
DdeQueryStringA
GetLastActivePopup
DrawStateA
GetScrollInfo
EnableWindow
IsIconic
AdjustWindowRect
GetWindowLongA
GetScrollPos
GetDoubleClickTime
GetKeyNameTextW
GetDlgItemTextA
SetActiveWindow
CopyIcon
IsClipboardFormatAvailable
MapVirtualKeyExA
CreateCursor
LoadCursorFromFileA
CharPrevW
SendNotifyMessageW
AttachThreadInput
GetMenu
GetWindowModuleFileNameA
BlockInput
ShowScrollBar
SendDlgItemMessageA
GetDlgItem
GetKeyState
IsDialogMessageA
WinHelpW
SetClassLongA
CheckMenuItem
UnhookWinEvent
CallMsgFilterA
DefWindowProcA
GetWindowTextA
UnpackDDElParam
PostQuitMessage
SetWindowPos
GetClassNameW
InsertMenuA
SendMessageA
SetKeyboardState
ShowWindow
OemToCharBuffA
GetWindowTextLengthA
LoadMenuW
SetMenuDefaultItem
GetClipboardData
EnumDisplaySettingsW
LoadStringW
InvalidateRect
GetTabbedTextExtentA
DrawStateW
BringWindowToTop
SetPropA
ShowCursor
SystemParametersInfoA
CharUpperW
MapVirtualKeyExW
SetDlgItemTextW
ReuseDDElParam
ScreenToClient
DestroyCaret
GetDlgCtrlID
GetForegroundWindow
DestroyAcceleratorTable
ShowOwnedPopups
GetMenuState
GetDlgItemInt
CharLowerBuffA
IsMenu
LoadKeyboardLayoutW
RegisterClipboardFormatA
SetDlgItemInt
FindWindowA
CreateMenu
CreateDialogParamA
SetMenu
CharUpperBuffW
LockWindowUpdate
SetRect
GetScrollRange
SetCaretPos
GetSysColor
CharNextA
GetMenuItemID
GetKeyboardState
RemovePropA
GetFocus
GetWindowWord
FindWindowExA
MoveWindow
mouse_event
MessageBoxA
TranslateMDISysAccel
GetUserObjectInformationW
EnableScrollBar
RegisterHotKey
IntersectRect
CloseDesktop
VkKeyScanExW
GetWindow
DialogBoxParamA
msvcrt
_fmode
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_time64
time
_onexit
__dllonexit
_mbctolower
_controlfp
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 544KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 212KB - Virtual size: 208KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ