Static task
static1
Behavioral task
behavioral1
Sample
0ad7d7ad68e970593dc21debb545c3f4_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0ad7d7ad68e970593dc21debb545c3f4_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0ad7d7ad68e970593dc21debb545c3f4_JaffaCakes118
-
Size
52KB
-
MD5
0ad7d7ad68e970593dc21debb545c3f4
-
SHA1
93478a7355e34bd78e6416e21cc2bcbda03db275
-
SHA256
4054e1e60ff1927bb2ced6338e8b96dd639c2dba7a6afd7256cdcfd5a9ce5577
-
SHA512
5e73b90b57ba1a888a37b96f726641989d7f006dba1a1caea944f89f43a102ff327b70c0bec411b9c75cbcb8c56096dc29bdf97f5098f0789a4f62d1bf552ddf
-
SSDEEP
768:4gP4gq7BH614yiFPk19JbMNDCviVYqahagE7SIjN/UDR2E:N4D7U1qcjWNKi+q8EusNq2E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ad7d7ad68e970593dc21debb545c3f4_JaffaCakes118
Files
-
0ad7d7ad68e970593dc21debb545c3f4_JaffaCakes118.exe windows:4 windows x86 arch:x86
5f2c5be2b303cb21f002ec593974b77b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
keybd_event
UpdateWindow
TranslateMessage
ShowWindow
SetTimer
SetForegroundWindow
SetCursorPos
SendNotifyMessageA
SendMessageTimeoutA
RegisterClassExA
PostQuitMessage
PeekMessageA
MoveWindow
ModifyMenuA
MessageBoxA
MapWindowPoints
mouse_event
LoadCursorA
LoadBitmapA
KillTimer
IsWindowVisible
IsWindowEnabled
IsWindow
InsertMenuItemA
GetWindowThreadProcessId
GetWindowRect
GetWindow
GetSystemMenu
GetSubMenu
GetParent
GetMessageA
GetMenuStringA
GetMenuItemID
LoadIconA
GetMenuItemCount
GetMenu
GetCursorPos
GetClassNameA
EnumWindows
EnumChildWindows
EnableWindow
EnableMenuItem
DrawMenuBar
DispatchMessageA
DefWindowProcA
CreateWindowExA
wsprintfA
kernel32
lstrlenA
lstrcpynA
lstrcpyA
lstrcmpA
lstrcatA
WriteProcessMemory
WriteFile
VirtualProtectEx
VirtualFree
VirtualAlloc
TerminateProcess
SystemTimeToFileTime
Sleep
SetPriorityClass
SetLocalTime
SetFileTime
SetFilePointer
SetFileAttributesA
SetEndOfFile
SetCurrentDirectoryA
RtlMoveMemory
ResumeThread
RemoveDirectoryA
ReadProcessMemory
ReadFile
OpenProcess
LocalUnlock
LocalLock
LocalFree
LocalFileTimeToFileTime
LocalAlloc
GetVersionExA
GetTickCount
GetModuleHandleA
CloseHandle
CopyFileA
CreateDirectoryA
CreateFileA
CreateMutexA
CreateProcessA
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCommandLineA
GetCurrentProcess
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetFileTime
GetLastError
GetLocalTime
GetModuleFileNameA
shell32
ShellExecuteExA
gdi32
DeleteObject
advapi32
RegSetValueExA
RegOpenKeyExA
RegOpenKeyA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE