Static task
static1
Behavioral task
behavioral1
Sample
05e72d47bda8bfe4ae652246e0f2f245_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
05e72d47bda8bfe4ae652246e0f2f245_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
05e72d47bda8bfe4ae652246e0f2f245_JaffaCakes118
-
Size
238KB
-
MD5
05e72d47bda8bfe4ae652246e0f2f245
-
SHA1
aab12eedfe2fe582e9b70a0d9cc2fd18f0bf3709
-
SHA256
12ef89010cc110a7263d62db0814982c589ad0da228e8cfe909ac45bc8c149aa
-
SHA512
dd3b73126a4f5159c4fbab3573aa19ad19464dfa503d4e6d7479718dfe881f02a2f50f769fdc19671342a7c9a085426d86b76355c74833e13cac887567a0ce0e
-
SSDEEP
6144:4hncjHMOMigptyIqmer8blyPYsDJjIIwfxe:AcITtjqpTLDF56
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 05e72d47bda8bfe4ae652246e0f2f245_JaffaCakes118
Files
-
05e72d47bda8bfe4ae652246e0f2f245_JaffaCakes118.exe windows:5 windows x86 arch:x86
2a4e13d8dd7323b163ed6ae2e4b26c47
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
RedrawWindow
TranslateMDISysAccel
SendDlgItemMessageA
SetWindowTextW
OffsetRect
SetMenu
WinHelpW
IsDlgButtonChecked
GetNextDlgTabItem
ReleaseDC
SetTimer
EndPaint
SetWindowPos
IsZoomed
GetWindowPlacement
SetWindowPlacement
SetCapture
ShowWindow
LoadCursorA
GetClientRect
InvalidateRect
GetKeyboardLayout
SetClassLongA
DrawIcon
DrawFrameControl
ScrollWindowEx
SetForegroundWindow
ScrollDC
CallWindowProcA
SetFocus
IsWindow
GetMenu
GetWindowTextW
UpdateWindow
CreateDialogIndirectParamA
EnumChildWindows
DestroyCursor
ole32
CoRegisterClassObject
CreateILockBytesOnHGlobal
OleMetafilePictFromIconAndLabel
OleLoad
OleCreateFromFile
RegisterDragDrop
GetHGlobalFromStream
OleIsCurrentClipboard
StgOpenStorageOnILockBytes
OleCreate
OleCreateLinkToFile
kernel32
GetStringTypeW
GetLogicalDrives
GetSystemDefaultLangID
WaitForSingleObject
lstrcmpW
GetModuleHandleA
WriteFile
GetTempFileNameA
lstrcmpA
HeapFree
SetPriorityClass
IsBadReadPtr
GlobalReAlloc
CreateThread
GlobalGetAtomNameW
Sleep
GlobalAlloc
LoadResource
GetVersion
GetTimeFormatA
GetLocaleInfoA
SetLastError
ReadFile
VirtualFree
QueryPerformanceFrequency
GlobalFree
VirtualAlloc
lstrcatA
GetACP
SearchPathW
InterlockedDecrement
GetCommandLineW
GetEnvironmentStringsW
SetFileAttributesW
OpenFile
LoadLibraryExA
VirtualFree
EnterCriticalSection
mll_bkup
_Exp
_FDtest
_Strcoll
_FDnorm
_Cosh
_LDscale
_Stold
_FExp
_LInf
_LSnan
advapi32
RegSetValueExA
gdi32
GetRgnBox
DPtoLP
DeleteMetaFile
CreatePen
OffsetWindowOrgEx
GetBitmapBits
RestoreDC
SetStretchBltMode
GetBkColor
SetWindowOrgEx
UpdateColors
GetTextFaceA
Ellipse
SetWindowExtEx
GetWinMetaFileBits
Rectangle
AnimatePalette
CreateRectRgn
GetTextMetricsA
StretchDIBits
EndDoc
PlayMetaFileRecord
ntdll
NtQueryInformationFile
ZwCreateTimer
ZwSetEvent
NtProtectVirtualMemory
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 209KB - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ