Static task
static1
Behavioral task
behavioral1
Sample
07f7a25e73336981be470e77cbad2b6d_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
07f7a25e73336981be470e77cbad2b6d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
07f7a25e73336981be470e77cbad2b6d_JaffaCakes118
-
Size
245KB
-
MD5
07f7a25e73336981be470e77cbad2b6d
-
SHA1
e70a5e684a164895f0d6346caa18f9591318324e
-
SHA256
90644b26edb6f82b8af979d27ed9f82eeac2027e2f283e7cbf7e3b49a2edd313
-
SHA512
2bb995adddab1a927f8eeb67b1e876c2bad49e556dbd4a6e544f00f3f170c0de911f284675f53243b017dc292c4e4441a4bd012dcac1728e57aeed9885626044
-
SSDEEP
6144:hBCb2cOL7SLMOQi9gvjVNQQjIwfQqsDbxRA0U:hBChWIOvjV61LA0U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07f7a25e73336981be470e77cbad2b6d_JaffaCakes118
Files
-
07f7a25e73336981be470e77cbad2b6d_JaffaCakes118.exe windows:4 windows x86 arch:x86
d5a135f8c296d945b7d5ebc9ab561847
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
EnumProcesses
EnumProcessModules
GetModuleFileNameExA
comctl32
InitCommonControlsEx
oleaut32
SysAllocString
SysFreeString
shlwapi
PathFindFileNameW
user32
GetCursorPos
GetDesktopWindow
RedrawWindow
RemovePropW
SendMessageW
FindWindowW
GetAncestor
SetWindowLongW
GetWindowRect
ExitWindowsEx
GetParent
GetSysColor
MessageBoxW
CopyRect
SetPropW
ScreenToClient
GetWindowLongW
EnableWindow
IsWindow
FillRect
LoadCursorW
DrawTextW
PostMessageW
SetWindowPos
SystemParametersInfoW
SetCursor
ClientToScreen
PtInRect
SetForegroundWindow
IsWindowVisible
GetPropW
GetClientRect
gdi32
SetBkMode
BitBlt
CreateFontIndirectW
DeleteDC
LineTo
DeleteObject
GetTextExtentPoint32W
CreatePen
CreateCompatibleBitmap
CreateCompatibleDC
SetBkColor
GetStockObject
SelectObject
GetTextMetricsW
SetTextJustification
SetTextColor
MoveToEx
GetCurrentObject
GetObjectW
CreateSolidBrush
kernel32
ResetEvent
GetCurrentThreadId
EnterCriticalSection
CreateThread
GetProcessTimes
WriteFile
SetFilePointer
OpenMutexW
IsDebuggerPresent
LeaveCriticalSection
CreateProcessW
UnhandledExceptionFilter
CreateDirectoryW
FindFirstFileW
VirtualQuery
ReleaseMutex
CreateMutexW
GetModuleHandleW
CreateFileW
UnmapViewOfFile
GetSystemTimeAsFileTime
GetCommandLineW
MapViewOfFile
FreeLibrary
OpenProcess
DeleteFileW
SetLastError
FindClose
OpenEventW
WaitForSingleObject
DeleteCriticalSection
GetLocalTime
OpenFileMappingW
CloseHandle
FindNextFileW
SetUnhandledExceptionFilter
FormatMessageA
VirtualAlloc
shell32
ShellExecuteW
SHGetFolderPathW
advapi32
LookupPrivilegeValueW
RegOpenKeyExW
RegCloseKey
AdjustTokenPrivileges
OpenProcessToken
RegQueryValueExW
GetUserNameW
odbccp32
SQLGetPrivateProfileString
SelectTransDlg
SQLInstallTranslator
SQLRemoveDriverW
SQLGetPrivateProfileStringW
SQLWriteFileDSN
aclui
EditSecurity
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.SOEtb Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.L Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.QtQRi Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idgF Size: 512B - Virtual size: 318B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gd Size: 512B - Virtual size: 619B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rlWBHG Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 213KB - Virtual size: 428KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 924B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ