Static task
static1
Behavioral task
behavioral1
Sample
081d4f8d537f4b52cf8c13cb26c8a76a_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
081d4f8d537f4b52cf8c13cb26c8a76a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
081d4f8d537f4b52cf8c13cb26c8a76a_JaffaCakes118
-
Size
124KB
-
MD5
081d4f8d537f4b52cf8c13cb26c8a76a
-
SHA1
f2944ac137b95d4150aeb2a50bda3e164048d327
-
SHA256
1a4a723a294ec9c7a497f1951a09bf2bc814ee3e98fe632d3fb5f2a08048c9f2
-
SHA512
c0d6cad139a46b29694f2b19682f12bb9f9cbc316f6030ee204f06b7e8c4d37140b9d3e68e6acc2d35e6a5a7c44010b989a9857ad316afd8f3c87e272cf71ed4
-
SSDEEP
1536:cyta42gizmVf0yS26J8syDySmuRUh+M8T/SL0k+7XHAXczo8rrCZ:cUMEfY2S8FySm4Uh+MCi0dAV8SZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 081d4f8d537f4b52cf8c13cb26c8a76a_JaffaCakes118
Files
-
081d4f8d537f4b52cf8c13cb26c8a76a_JaffaCakes118.exe windows:1 windows x86 arch:x86
fdde492e067a5c1d828e260be526d61a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHBrowseForFolderA
SHGetDesktopFolder
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
Shell_NotifyIconA
advapi32
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegSetValueExA
gdi32
AddFontResourceA
BitBlt
CreateCompatibleDC
CreateDIBSection
CreateFontIndirectA
DeleteObject
ExtTextOutA
GetTextExtentPoint32A
GetTextMetricsA
RemoveFontResourceA
SelectObject
SetBkMode
SetTextColor
user32
BeginPaint
BringWindowToTop
CallWindowProcA
CharUpperBuffA
CloseClipboard
CreateWindowExA
DefWindowProcA
DeleteMenu
DestroyIcon
DestroyMenu
DialogBoxParamA
DispatchMessageA
DrawFrameControl
EnableWindow
EndDialog
EndPaint
FindWindowA
GetClientRect
GetClipboardData
GetCursorPos
GetDC
GetDesktopWindow
GetDlgItem
GetDlgItemInt
GetDlgItemTextA
GetMenu
GetMenuItemInfoA
GetMessageA
GetParent
GetSubMenu
GetSysColorBrush
GetSystemMetrics
GetUpdateRect
GetWindowLongA
GetWindowRect
InsertMenuItemA
InvalidateRect
IsIconic
LoadCursorA
LoadIconA
LoadMenuA
MessageBoxA
OpenClipboard
PeekMessageA
PostMessageA
PostQuitMessage
RegisterClassExA
RegisterHotKey
RegisterWindowMessageA
SendDlgItemMessageA
SendMessageA
SetDlgItemInt
SetDlgItemTextA
SetForegroundWindow
SetMenuItemInfoA
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
TrackPopupMenu
TranslateMessage
UnregisterClassA
UnregisterHotKey
UpdateWindow
kernel32
AllocConsole
CloseHandle
CreateEventA
CreateFileA
CreateMutexA
CreateThread
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
ExitThread
FlushFileBuffers
FreeEnvironmentStringsA
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThreadId
GetCurrentThread
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetOEMCP
GetProcAddress
GetStdHandle
GetSystemDirectoryA
GetTempPathA
GetTickCount
GetTimeZoneInformation
GetVersionExA
GetVersion
GetWindowsDirectoryA
GlobalLock
GlobalSize
GlobalUnlock
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
MoveFileA
MultiByteToWideChar
ReadConsoleInputA
ReadFile
ReleaseMutex
ResetEvent
SetConsoleCtrlHandler
SetConsoleMode
SetConsoleTitleA
SetEnvironmentVariableA
SetEnvironmentVariableW
SetEvent
SetFilePointer
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteFile
comctl32
InitCommonControlsEx
snmpapi
SnmpUtilVarBindFree
comdlg32
GetOpenFileNameA
GetSaveFileNameA
wsock32
WSACleanup
WSAStartup
gethostname
getservbyport
gethostbyname
gethostbyaddr
getpeername
getsockname
recv
send
ntohs
recvfrom
sendto
accept
listen
bind
select
connect
htons
shutdown
setsockopt
inet_ntoa
closesocket
socket
WSAGetLastError
getsockopt
__WSAFDIsSet
Sections
AUTO Size: 88KB - Virtual size:
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 5KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DGROUP Size: 13KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 9KB - Virtual size:
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 10KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ