Static task
static1
Behavioral task
behavioral1
Sample
013c4cf61b8d92ae3b3a75daf994bafd_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
013c4cf61b8d92ae3b3a75daf994bafd_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
013c4cf61b8d92ae3b3a75daf994bafd_JaffaCakes118
-
Size
200KB
-
MD5
013c4cf61b8d92ae3b3a75daf994bafd
-
SHA1
0a5322d2520fccc15af0acc550224137b1f629a8
-
SHA256
904d15e44f504235e1cf849588e68b44d0be7562a04bdc7a1adeafc5fb1427fd
-
SHA512
bc447b8893289248207f6e762e30d235cdf9601a2ef182d6f72c6de788f3fd41689f1465c234d57405147649ee78d56081641205cd4ee71fa65ec83f29f55a6b
-
SSDEEP
3072:KR6JVPx++LLL7SufZ/MPEBMoFM0OuOhSr0J5SgT0DbqV:dx+qL7rB/MPGMoFx+5t0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 013c4cf61b8d92ae3b3a75daf994bafd_JaffaCakes118
Files
-
013c4cf61b8d92ae3b3a75daf994bafd_JaffaCakes118.exe windows:4 windows x86 arch:x86
c4fee5642487c53b009569f428b431a5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DrawEdge
DrawFrameControl
DispatchMessageW
ClientToScreen
DestroyCursor
CharToOemA
DispatchMessageA
DestroyIcon
DestroyWindow
ChildWindowFromPoint
BeginPaint
CharNextA
CreateIcon
CheckMenuItem
CharLowerA
CharLowerBuffA
CharUpperBuffA
DefFrameProcA
DrawIcon
CharNextW
DestroyMenu
CallWindowProcA
CloseClipboard
CreatePopupMenu
CreateMenu
DefMDIChildProcA
CallNextHookEx
DeleteMenu
DefWindowProcA
AdjustWindowRectEx
comdlg32
GetFileTitleA
GetOpenFileNameA
ChooseColorA
GetSaveFileNameA
FindTextA
msvcrt
abs
comctl32
ImageList_Remove
ImageList_Write
ImageList_DragShowNolock
ImageList_Draw
ImageList_Destroy
ImageList_Read
ImageList_GetBkColor
ImageList_Add
oleaut32
SysAllocStringLen
version
GetFileVersionInfoSizeA
VerInstallFileA
ole32
CreateBindCtx
StgCreateDocfileOnILockBytes
kernel32
CreateEventA
CompareStringA
CreateThread
DeleteCriticalSection
GetDiskFreeSpaceA
GetFileType
lstrlenA
GetFileSize
GlobalAlloc
DeleteFileA
FindClose
GetProcAddress
EnumCalendarInfoA
GetFullPathNameA
GetCurrentThreadId
GetCommandLineA
EnterCriticalSection
GetACP
LoadLibraryA
FindResourceA
GetEnvironmentStrings
CreateFileA
GetCurrentProcessId
FreeResource
GetVersionExA
FindFirstFileA
FormatMessageA
GetModuleHandleA
ExitProcess
VirtualAlloc
GetCPInfo
ExitThread
CloseHandle
GetLastError
GetFileAttributesA
Sleep
LocalAlloc
FreeLibrary
IsBadReadPtr
GetDateFormatA
shell32
Shell_NotifyIconA
SHGetFileInfoA
SHGetDiskFreeSpaceA
gdi32
GetDIBits
GetObjectA
GetPaletteEntries
GetDIBColorTable
SelectObject
GetRgnBox
LineTo
GetPixel
CreatePenIndirect
shlwapi
SHGetValueA
SHDeleteKeyA
SHEnumValueA
PathIsDirectoryA
PathGetCharTypeA
SHSetValueA
PathFileExistsA
SHDeleteValueA
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 942B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc2 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc7 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc3 Size: 118KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc9 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc6 Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ