Static task
static1
Behavioral task
behavioral1
Sample
047ea57523c11ea5722c047ffd53180d_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
047ea57523c11ea5722c047ffd53180d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
047ea57523c11ea5722c047ffd53180d_JaffaCakes118
-
Size
556KB
-
MD5
047ea57523c11ea5722c047ffd53180d
-
SHA1
0839b9b4b8b45d1f72207f657c2be006f8d5be3a
-
SHA256
7cdbab79e3db407526b164dc5415c708644fbe9cdc7cfc3b3de8915cc2c75fa3
-
SHA512
ebd491e084238133bc01536446c4952ff2b1d222066ee8a36345c786de21385f6f5855777ac5f10e1f8a9e223a0589ddb7fabd4b1709766d6fc14a73aace17ad
-
SSDEEP
12288:bgENxCN7BnhRrCi4h4tDk/T7g3/joQo5j9cqHoAuvd5K/m:bXNxCN7vRrCADk/2xqCvG+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 047ea57523c11ea5722c047ffd53180d_JaffaCakes118
Files
-
047ea57523c11ea5722c047ffd53180d_JaffaCakes118.exe windows:4 windows x86 arch:x86
7044ce769a7f51bbd99506d6a7d44cfa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_Read
ImageList_SetIconSize
CreatePropertySheetPage
InitCommonControlsEx
ImageList_Destroy
CreateStatusWindowA
CreateStatusWindowW
ImageList_Copy
ImageList_DragShowNolock
ImageList_Create
ImageList_DragMove
DrawInsert
ImageList_DrawIndirect
ImageList_SetImageCount
user32
RemoveMenu
MonitorFromPoint
DragDetect
DdeKeepStringHandle
SetMenuItemInfoW
InSendMessageEx
GetActiveWindow
UnhookWindowsHook
EnumChildWindows
RegisterClassA
OpenDesktopW
LockWindowUpdate
PeekMessageW
DispatchMessageW
CharNextA
DestroyMenu
UnregisterClassA
GetTabbedTextExtentW
GetListBoxInfo
GetKeyboardType
GetShellWindow
CopyAcceleratorTableA
SetRectEmpty
RegisterClassExA
CreateDialogIndirectParamA
GetKeyboardLayout
SetPropW
IntersectRect
LoadCursorFromFileW
GetWindowTextLengthW
kernel32
HeapDestroy
FlushFileBuffers
GetCurrentThreadId
GetStdHandle
VirtualProtect
EnumSystemLocalesA
FreeEnvironmentStringsA
CompareStringA
DeleteCriticalSection
GetLocaleInfoW
IsValidCodePage
IsValidLocale
ReadFile
VirtualQuery
GetFileAttributesExW
ContinueDebugEvent
GetFileType
GetVersionExA
TerminateProcess
GetModuleFileNameA
GlobalFindAtomA
SetFilePointer
InterlockedExchange
CreateToolhelp32Snapshot
GlobalAlloc
VirtualAlloc
CreateDirectoryW
EnumCalendarInfoExW
GetStartupInfoA
GetEnvironmentStringsW
GetProfileIntW
CloseHandle
GetFileTime
HeapAlloc
FindFirstFileExW
GetCommandLineA
FindFirstFileW
OpenMutexA
SetLastError
GetTimeFormatA
SetHandleCount
TlsSetValue
HeapReAlloc
GetStringTypeA
SetStdHandle
GetCurrentDirectoryW
VirtualFree
LCMapStringW
TlsAlloc
WriteFile
CompareStringW
DosDateTimeToFileTime
SetConsoleCP
GetDateFormatA
EnumTimeFormatsW
GetLocaleInfoA
CopyFileExA
GetPrivateProfileIntW
GlobalGetAtomNameW
HeapFree
IsBadWritePtr
GetLastError
GetSystemTimeAsFileTime
CreatePipe
LocalSize
SetThreadPriority
GetShortPathNameW
SetVolumeLabelW
GetEnvironmentStrings
LCMapStringA
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetOEMCP
TlsGetValue
GetSystemDirectoryA
GetStringTypeW
EnumResourceLanguagesA
CreateFileW
EnterCriticalSection
MultiByteToWideChar
GetACP
HeapCreate
FindNextFileA
GetUserDefaultLCID
GetSystemInfo
GetTimeZoneInformation
HeapSize
GetCPInfo
TlsFree
LeaveCriticalSection
QueryPerformanceCounter
GetCurrentThread
GetModuleHandleA
GetFileAttributesExA
GetProcAddress
CreateMutexA
VirtualFreeEx
GetCurrentProcess
lstrcatA
SetEnvironmentVariableA
ExitProcess
RtlUnwind
InitializeCriticalSection
WideCharToMultiByte
GetCurrentDirectoryA
VirtualProtectEx
LoadLibraryA
MapViewOfFile
GetTickCount
GetCurrentProcessId
gdi32
CreateDCW
GetObjectA
TextOutW
GetROP2
DeleteObject
DeleteDC
GetDeviceCaps
SelectObject
Sections
.text Size: 179KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 109KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ