Static task
static1
Behavioral task
behavioral1
Sample
01750c9c15aa35a6a218fde1758aa1c0_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
01750c9c15aa35a6a218fde1758aa1c0_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
01750c9c15aa35a6a218fde1758aa1c0_JaffaCakes118
-
Size
26KB
-
MD5
01750c9c15aa35a6a218fde1758aa1c0
-
SHA1
c19c010d692dc46a480e958ceb67958d377917d6
-
SHA256
4a9d56c9f4edfc2287214e1890dd29e308d41f396994453c732802362e3bc021
-
SHA512
a7cdfeeef488e192f1cd3cb92d399a9ec299f68f46b7eef6b0674d95f2ca496682b9919f96eb31ad4c041618381d76f4705d5631cd6e3a7bf03899a6b6f5ed1d
-
SSDEEP
768:Mu3qUN6Gk4fABMoVzaYCvYCm3K4xREUF:MGNJIOQza3v3m3ZRE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01750c9c15aa35a6a218fde1758aa1c0_JaffaCakes118
Files
-
01750c9c15aa35a6a218fde1758aa1c0_JaffaCakes118.exe windows:4 windows x86 arch:x86
d7c4052b82bf414b69a58816d488f4ab
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
VirtualProtect
LocalAlloc
ReleaseSemaphore
UnregisterWaitEx
Module32FirstW
Heap32ListFirst
FindVolumeMountPointClose
OpenMutexW
LockFileEx
UnregisterConsoleIME
GetNamedPipeHandleStateA
GetComputerNameA
FindClose
UTUnRegister
_lopen
WritePrivateProfileSectionW
UnmapViewOfFile
CancelIo
ReadConsoleInputA
ExpandEnvironmentStringsA
CreateFileMappingW
GlobalHandle
BackupSeek
SetSystemTimeAdjustment
GetDateFormatW
TlsSetValue
GetSystemWindowsDirectoryA
GetCPInfoExA
FindResourceA
user32
CtxInitUser32
SetTaskmanWindow
MB_GetString
ToUnicodeEx
DeferWindowPos
CloseDesktop
GetWindowPlacement
SetSysColorsTemp
SendDlgItemMessageA
EnumDesktopWindows
SetDlgItemTextA
ShowWindow
OemToCharBuffA
GetScrollInfo
IsCharUpperW
Win32PoolAllocationStats
DdeCmpStringHandles
DialogBoxParamA
EnumPropsA
ChildWindowFromPoint
ToAsciiEx
GetMenuStringW
GetClipboardFormatNameA
EnumDisplayMonitors
GetMenuItemInfoW
DestroyIcon
LoadCursorFromFileW
CliImmSetHotKey
GetCursorInfo
GetCursorFrameInfo
CreateCursor
SetWindowsHookExW
EndTask
UpdateWindow
EndDeferWindowPos
GetFocus
GetScrollPos
IsCharAlphaNumericW
GetMenuItemRect
InsertMenuItemA
CopyAcceleratorTableA
SetCursorContents
GetClassInfoExW
RegisterClassExA
GetInternalWindowPos
RegisterClassW
GetMenuInfo
gdi32
GetRegionData
FloodFill
EngGetPrinterDataFileName
GdiPlayScript
GdiGetLocalBrush
EngStrokeAndFillPath
SetColorSpace
GetDIBColorTable
GetWindowOrgEx
GetOutlineTextMetricsW
EngPlgBlt
GetClipBox
GetLayout
SetBoundsRect
GdiConvertMetaFilePict
DeleteMetaFile
PolyPolygon
EqualRgn
SetViewportOrgEx
SelectBrushLocal
CreateDIBPatternBrushPt
EngLoadModule
SetBitmapDimensionEx
CombineTransform
PolyBezierTo
EngDeletePath
RemoveFontResourceA
CreateDCA
RectVisible
EnumICMProfilesW
PATHOBJ_bEnum
GdiInitializeLanguagePack
StartPage
SetTextColor
GdiEntry9
GdiDeleteLocalDC
GdiPlayJournal
ExtCreateRegion
LPtoDP
GdiStartPageEMF
GetStringBitmapW
CreateHatchBrush
GetDeviceGammaRamp
SetMagicColors
comdlg32
PrintDlgW
ReplaceTextW
FindTextA
GetFileTitleA
LoadAlterBitmap
dwOKSubclass
WantArrows
PrintDlgExA
GetOpenFileNameA
GetSaveFileNameA
PageSetupDlgW
ChooseFontW
ChooseColorW
psapi
GetMappedFileNameA
GetModuleBaseNameW
GetDeviceDriverBaseNameA
GetDeviceDriverBaseNameW
QueryWorkingSet
EnumProcessModules
GetMappedFileNameW
GetWsChanges
GetModuleInformation
EnumDeviceDrivers
GetModuleBaseNameA
EmptyWorkingSet
GetModuleFileNameExA
GetProcessMemoryInfo
GetModuleFileNameExW
GetDeviceDriverFileNameA
comctl32
CreateToolbar
PropertySheetA
ImageList_Replace
ImageList_GetFlags
FlatSB_SetScrollPos
CreateStatusWindowA
ImageList_SetBkColor
CreatePropertySheetPage
DllGetVersion
ImageList_DrawEx
ImageList_GetImageInfo
ImageList_GetBkColor
FlatSB_GetScrollPos
FlatSB_GetScrollRange
ImageList_GetIconSize
DrawStatusTextA
DrawInsert
CreatePropertySheetPageW
ImageList_Duplicate
Sections
.text Size: 4KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE