Static task
static1
Behavioral task
behavioral1
Sample
003f87f0ecc7c0bb5a5755b3f6e46e3b_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
003f87f0ecc7c0bb5a5755b3f6e46e3b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
003f87f0ecc7c0bb5a5755b3f6e46e3b_JaffaCakes118
-
Size
45KB
-
MD5
003f87f0ecc7c0bb5a5755b3f6e46e3b
-
SHA1
9061ce3c2ab9390e4e8355f6710b29666a5f970a
-
SHA256
71a3d479a4d675a8545c69376a736cfd1baf82f90325c05b416f3f98f2f161c4
-
SHA512
2d07d768f63de2c2fdad63607325d61e121641a26fb341f8c7bbed8f6132b845b52cd4257b1a1f6fd40c18b24ccd39e83a1f4937295699842150313c4a74cbc3
-
SSDEEP
768:B1KUlEdi/ngkxqc/oVWxcjj+lsGZwT8shbeKP6OPmHLw:r5x/5qcwgOjj+lxw4A/CmmH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 003f87f0ecc7c0bb5a5755b3f6e46e3b_JaffaCakes118
Files
-
003f87f0ecc7c0bb5a5755b3f6e46e3b_JaffaCakes118.exe windows:4 windows x86 arch:x86
3d7a5f2a82a9f4d42de438b53d368dd0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalReAlloc
VirtualProtect
SetConsoleNumberOfCommandsA
HeapFree
Module32First
GetLogicalDriveStringsW
GetCommandLineW
GetNumberOfConsoleInputEvents
ConsoleMenuControl
VerLanguageNameA
SetConsoleMaximumWindowSize
EnumCalendarInfoExW
CreateThread
GetConsoleHardwareState
RegisterConsoleVDM
GetCommProperties
ExpandEnvironmentStringsA
ReadConsoleOutputA
lstrlen
GetConsoleAliasesA
GetProcessPriorityBoost
TransactNamedPipe
TryEnterCriticalSection
IsBadReadPtr
GetCommModemStatus
GetComputerNameExA
SetCriticalSectionSpinCount
SwitchToFiber
SetConsoleActiveScreenBuffer
CancelTimerQueueTimer
AddConsoleAliasW
WriteConsoleOutputW
OpenEventA
CreateFileW
InterlockedExchange
LocalFileTimeToFileTime
SetCalendarInfoW
WriteConsoleOutputCharacterW
DnsHostnameToComputerNameA
HeapAlloc
GetLastError
SetSystemTimeAdjustment
FreeLibraryAndExitThread
GetComputerNameExW
user32
SetDlgItemInt
GetTabbedTextExtentW
LockWindowStation
GetMenuDefaultItem
InitializeLpkHooks
SetClassWord
ScreenToClient
GetNextDlgTabItem
MessageBeep
TileWindows
DefWindowProcW
OpenDesktopA
SetScrollPos
IsMenu
WCSToMBEx
MoveWindow
CreateMDIWindowW
FindWindowExW
MenuItemFromPoint
OpenIcon
CreateWindowStationA
CloseWindow
UnhookWindowsHookEx
RegisterWindowMessageA
IsHungAppWindow
DefMDIChildProcA
DdeQueryStringA
GetSystemMenu
UnpackDDElParam
mouse_event
CreateWindowExW
GetDoubleClickTime
GetCursorInfo
MonitorFromPoint
SetMessageQueue
SetCaretPos
GetKeyNameTextA
SendDlgItemMessageW
HiliteMenuItem
gdi32
EngCreatePalette
SetMapperFlags
GetMiterLimit
GetStringBitmapA
XLATEOBJ_cGetPalette
BRUSHOBJ_hGetColorTransform
CreateICW
GetGraphicsMode
SetROP2
PolyBezier
PolyTextOutA
GdiAddGlsRecord
ScaleWindowExtEx
GetColorAdjustment
Polyline
StretchDIBits
UpdateColors
comdlg32
GetFileTitleW
ChooseFontA
FindTextW
PageSetupDlgA
ChooseColorA
GetSaveFileNameW
PrintDlgExW
PrintDlgA
GetOpenFileNameW
psapi
GetDeviceDriverFileNameA
EnumProcessModules
GetWsChanges
GetDeviceDriverBaseNameA
GetModuleInformation
GetDeviceDriverBaseNameW
GetMappedFileNameW
EnumDeviceDrivers
GetModuleFileNameExA
GetDeviceDriverFileNameW
EmptyWorkingSet
GetModuleFileNameExW
InitializeProcessForWsWatch
GetModuleBaseNameW
GetMappedFileNameA
EnumProcesses
QueryWorkingSet
GetProcessMemoryInfo
GetModuleBaseNameA
comctl32
CreatePropertySheetPageA
ImageList_DragEnter
PropertySheet
DrawStatusText
FlatSB_ShowScrollBar
ImageList_GetImageRect
ImageList_DrawIndirect
ImageList_DragMove
UninitializeFlatSB
ImageList_GetImageCount
CreateMappedBitmap
ImageList_EndDrag
ImageList_Draw
InitCommonControlsEx
GetMUILanguage
ImageList_Create
CreateStatusWindow
ImageList_SetDragCursorImage
CreateToolbarEx
MakeDragList
ImageList_Remove
ImageList_SetImageCount
PropertySheetW
ImageList_AddIcon
CreateStatusWindowW
ImageList_BeginDrag
FlatSB_SetScrollInfo
DestroyPropertySheetPage
ImageList_Merge
ImageList_ReplaceIcon
FlatSB_GetScrollInfo
FlatSB_SetScrollProp
Sections
.text Size: 4KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE