Static task
static1
Behavioral task
behavioral1
Sample
7b8b0adf123971d8aa164b4749701ba0_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7b8b0adf123971d8aa164b4749701ba0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
7b8b0adf123971d8aa164b4749701ba0_JaffaCakes118
-
Size
2.1MB
-
MD5
7b8b0adf123971d8aa164b4749701ba0
-
SHA1
09f7602b226d4abf0087214ef1706e663b3f0dca
-
SHA256
7f441d3ef206830f977268d79b6d8495ca885af9fb330e0bc05d1645e7e2783b
-
SHA512
ec8171ed4d3f503663594e62cb81d3ff3d35b5402612d744539266f4b7eb409fe8a2635e25aabbe59d7e6505fa5985ef39817030ffb214bc452a715d392f134e
-
SSDEEP
24576:1yrvucgtBI5bNfTygAE6v4uMnSdybyVpRAmEzN2Qpi:1yrG7tBabNOEswfpj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7b8b0adf123971d8aa164b4749701ba0_JaffaCakes118
Files
-
7b8b0adf123971d8aa164b4749701ba0_JaffaCakes118.exe windows:5 windows x86 arch:x86
0c6187f5f9c4e8e7e285d83dfdeebc19
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winspool.drv
EnumJobsW
user32
EnableWindow
UnregisterClassW
DdeUnaccessData
DdeImpersonateClient
PtInRect
CopyRect
GetSysColorBrush
SetWindowContextHelpId
GetDCEx
GetSystemMetrics
GetLayeredWindowAttributes
MsgWaitForMultipleObjectsEx
GetActiveWindow
IsClipboardFormatAvailable
GetDlgCtrlID
DialogBoxParamW
MoveWindow
ExitWindowsEx
ole32
PropVariantClear
kernel32
GetProcessHeap
CreateFileW
WriteConsoleW
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LCMapStringW
HeapSize
HeapReAlloc
HeapAlloc
GetStringTypeW
OutputDebugStringW
RtlUnwind
LoadLibraryExW
GlobalLock
VirtualAlloc
ExitProcess
InitializeCriticalSection
SetEndOfFile
CloseHandle
TransmitCommChar
GetSystemTime
GetSystemInfo
FileTimeToLocalFileTime
TlsAlloc
CreateMutexW
OpenEventW
GetDriveTypeW
CreateDirectoryW
GetFileAttributesW
DeleteFileW
GetVersionExW
GetOEMCP
MultiByteToWideChar
EnumSystemLanguageGroupsW
EnumSystemCodePagesW
GetConsoleWindow
GetCommandLineW
RaiseException
EncodePointer
GetLastError
SetLastError
GetCurrentThreadId
DecodePointer
GetModuleHandleExW
GetProcAddress
WideCharToMultiByte
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
IsProcessorFeaturePresent
IsDebuggerPresent
IsValidCodePage
GetACP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
HeapFree
Sections
.text Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 966KB - Virtual size: 8.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 724B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.7naa Size: 384KB - Virtual size: 383KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.soso1o Size: 394KB - Virtual size: 394KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.715e Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.7c5sn Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ