Static task
static1
Behavioral task
behavioral1
Sample
081f8afe93e7d63b703b28b876431017_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
081f8afe93e7d63b703b28b876431017_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
081f8afe93e7d63b703b28b876431017_JaffaCakes118
-
Size
28KB
-
MD5
081f8afe93e7d63b703b28b876431017
-
SHA1
4cc39f5ff1d6bb28e6aca34c3dcfebbd1fd494d1
-
SHA256
a0ceec6308b530d9eb0d2e73b81d261bc65bab2ab48c37c957c004b8087d63fb
-
SHA512
38b55957ada5daa0c718e13bae4b4ec8244aaa397f47b10e0ae447c08e5f85e14c217cd98e69403969f9cdafa0607596a6cc30463ff4c2f127bf87233d2b14db
-
SSDEEP
384:VmxPrfnmsgZt/1yE8OU1ZdMPav0SEjaSug0i8BECyOELEBtP3SQhusU4H:wPru1j/1iOMZu83gOOOwOxXPH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 081f8afe93e7d63b703b28b876431017_JaffaCakes118
Files
-
081f8afe93e7d63b703b28b876431017_JaffaCakes118.exe windows:4 windows x86 arch:x86
9faebf94873940ec08779d4318074d2e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AllocateAndInitializeSid
FreeSid
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
DeleteObject
GetBitmapBits
GetObjectA
SelectObject
kernel32
AddAtomA
CloseHandle
CopyFileA
CreateMutexA
CreateThread
CreateToolhelp32Snapshot
ExitProcess
FindAtomA
FreeLibrary
GetAtomNameA
GetCurrentProcessId
GetEnvironmentVariableA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessId
GetSystemDirectoryA
GetTickCount
LoadLibraryA
OpenMutexA
OpenProcess
Process32First
Process32Next
ReadProcessMemory
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TerminateThread
VirtualAllocEx
VirtualFreeEx
WriteProcessMemory
lstrcatA
lstrcmpiA
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
calloc
fflush
fprintf
free
malloc
memcmp
memcpy
memset
printf
puts
rand
signal
strcmp
strcpy
strlen
strstr
shell32
ShellExecuteA
ShellExecuteExA
user32
AllowSetForegroundWindow
BlockInput
DestroyWindow
EnumWindows
FindWindowA
FindWindowExA
GetDC
GetForegroundWindow
GetParent
GetSystemMetrics
GetWindowLongA
GetWindowRect
GetWindowTextA
GetWindowThreadProcessId
IsWindowVisible
LoadBitmapA
SendMessageA
SetCursorPos
SetForegroundWindow
SetLayeredWindowAttributes
SetWindowLongA
ShowWindow
mouse_event
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 176B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE