Static task
static1
Behavioral task
behavioral1
Sample
0a7467f792cc920b2f88cf752e3ac845_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0a7467f792cc920b2f88cf752e3ac845_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0a7467f792cc920b2f88cf752e3ac845_JaffaCakes118
-
Size
183KB
-
MD5
0a7467f792cc920b2f88cf752e3ac845
-
SHA1
9b5641219abbf80fc3d6890cd0d43c69a002e8bf
-
SHA256
5d844ac3b7a977b5b5425cb044d8e2bd30964f1fcc1250b3ba5762861f94eb3d
-
SHA512
92f5bcd361cdd85cf9fa48b2cbb51c5291fb8b29c093559baade416ed9e7648cd1dc4e6ce7563aefc8b84ce69d331ca77b388c995eff372faaddbc7b085d8109
-
SSDEEP
3072:axdC1qMD076AGoht9CaVySS7qGsTQJ8OXVZo5oJolMf53xEEJIsokfh6g6mA/F:shgi6AzhtVNSOyJFZBJaMfp1JIsN9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a7467f792cc920b2f88cf752e3ac845_JaffaCakes118
Files
-
0a7467f792cc920b2f88cf752e3ac845_JaffaCakes118.exe windows:4 windows x86 arch:x86
ea09ea98b079455a84205294de44e35d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
ole32
ProgIDFromCLSID
CoTaskMemFree
StringFromCLSID
gdi32
CreateRectRgn
SelectObject
SetBkMode
CreateFontIndirectA
BitBlt
DeleteMetaFile
TextOutA
GetObjectA
SaveDC
DeleteDC
DeleteObject
EnumFontFamiliesExA
CreateCompatibleDC
SetTextColor
GetTextExtentPoint32A
GetDeviceCaps
Rectangle
GetStockObject
RestoreDC
CreateSolidBrush
CreateCompatibleBitmap
advapi32
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegSetValueExA
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
winmm
mciSendCommandA
sndPlaySoundA
oleacc
LresultFromObject
CreateStdAccessibleObject
user32
SetWindowLongA
SetCursor
ReleaseDC
GetDC
ReleaseCapture
GetWindowInfo
IsWindow
GetSysColor
GetDlgItem
FillRect
LoadCursorA
GetWindowLongA
MoveWindow
SetWindowPos
SetCapture
kernel32
SetTapeParameters
GetVersion
ClearCommError
FindClose
GetCurrentProcessId
Sleep
GetWindowsDirectoryA
EnumResourceNamesA
ExitProcess
InterlockedExchange
GetLocalTime
FindFirstFileA
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
Sections
.text Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lib Size: 512B - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ