Static task
static1
Behavioral task
behavioral1
Sample
0d66d79bbc383c297eb8f1f7696d4937_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0d66d79bbc383c297eb8f1f7696d4937_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0d66d79bbc383c297eb8f1f7696d4937_JaffaCakes118
-
Size
112KB
-
MD5
0d66d79bbc383c297eb8f1f7696d4937
-
SHA1
1cb126f0734c4755e952ec18775e5278b962f75c
-
SHA256
bd8f97cc37bf2cc01fe2f3db8fa9d6177fcd81fd630d9fa896be3d1ee52afcfd
-
SHA512
02b2a2fd33657010a334ee3875784eae211839efd59875ff1d88d2bf0468818156e9d7259e6b37c3adc634ce248f576f1ad0bd40563e5661764f7b5f4caf68f7
-
SSDEEP
3072:KKq7cQUYtOKsPH58NunuEaldb5aft5n4i4fSORKoJi5Q6YHZqihZsUksFCU:KKqhUYGPH58NuEdFaft5n4i4aORjJi5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d66d79bbc383c297eb8f1f7696d4937_JaffaCakes118
Files
-
0d66d79bbc383c297eb8f1f7696d4937_JaffaCakes118.exe windows:4 windows x86 arch:x86
b54e6310330c621803053bd997a268a6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SendMessageA
IsWindow
FindWindowA
GetMenu
GetClassNameA
wsprintfA
GetWindowTextA
CharLowerA
SetForegroundWindow
SetFocus
ShowWindow
VkKeyScanA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
BlockInput
keybd_event
FindWindowExA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
VariantClear
SysFreeString
SysAllocString
VariantInit
msvcrt
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_strcmpi
_controlfp
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
system
_strlwr
fread
_vsnprintf
_iob
_splitpath
strtok
rand
sscanf
atoi
strrchr
strncat
fopen
fgets
fclose
fprintf
_snprintf
malloc
free
strcmp
strstr
memcmp
memcpy
memset
strcat
??2@YAPAXI@Z
__CxxFrameHandler
sprintf
srand
strcpy
strlen
toupper
strncpy
_strdup
strchr
_except_handler3
kernel32
DeleteFileA
GetProcessHeap
GetStartupInfoA
MultiByteToWideChar
CreateMutexA
ExpandEnvironmentStringsA
QueryPerformanceFrequency
QueryPerformanceCounter
GetLocaleInfoA
MoveFileA
lstrcpyA
lstrcmpA
lstrcpynA
RemoveDirectoryA
CreateThread
ReleaseMutex
GetTempPathA
GetWindowsDirectoryA
GetFileTime
SetFileTime
GetFileAttributesA
TerminateThread
GetCurrentThread
GetCurrentProcess
TerminateProcess
OpenProcess
lstrcmpiA
LoadLibraryA
GetVersionExA
GetDateFormatA
GetTimeFormatA
GlobalMemoryStatus
GetSystemDirectoryA
GetDiskFreeSpaceExA
CreateProcessA
WaitForSingleObject
ExitProcess
GetLogicalDriveStringsA
CreateDirectoryA
GetLastError
GetProcAddress
GetDriveTypeA
FindFirstFileA
SetCurrentDirectoryA
GetFullPathNameA
lstrcatA
FindNextFileA
FindClose
CreateFileA
GetFileSize
CloseHandle
WriteFile
SetFilePointer
CreateFileMappingA
MapViewOfFile
lstrlenA
UnmapViewOfFile
GlobalFree
GetModuleHandleA
GetModuleFileNameA
GetVersion
CopyFileA
SetFileAttributesA
InterlockedDecrement
GetTickCount
GlobalAlloc
GlobalLock
GlobalUnlock
Sleep
ExitThread
Sections
.text Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 358KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE