Static task
static1
Behavioral task
behavioral1
Sample
0dd97f0633da11d6a70e2d74e4681339_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0dd97f0633da11d6a70e2d74e4681339_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0dd97f0633da11d6a70e2d74e4681339_JaffaCakes118
-
Size
55KB
-
MD5
0dd97f0633da11d6a70e2d74e4681339
-
SHA1
b96dc3a875a1d5f63da052c02cccbe55b3b32a63
-
SHA256
db904ca33c1c0f021e291a7fdb9f3a2187f4de2b01e2349a90e65ef3cd0bd548
-
SHA512
785f08b17932f7ced585ab1fc5ebe0369aa0d5b5cad842309219c7fd7734e59335f84dbb680f6eb7f9d66a9ca8121e000b0aaf0ccb18561b740284f359bee7c0
-
SSDEEP
768:TlzLqKAhh1UkQgc1E4W+5AtdaDzmyN1+WbmmNZsm0gi+z95HV+huHJ1ffNhZQcl1:x6KABbQ7rW+5rI/g9603o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0dd97f0633da11d6a70e2d74e4681339_JaffaCakes118
Files
-
0dd97f0633da11d6a70e2d74e4681339_JaffaCakes118.exe windows:5 windows x86 arch:x86
624b9233ac756fcb0e86050e42d0aa9f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetForegroundWindow
GetClipboardData
GetMessageW
FindWindowExW
OpenDesktopA
ExitWindowsEx
SendMessageW
CloseDesktop
GetIconInfo
GetWindowThreadProcessId
CloseWindowStation
GetMessageA
CharLowerBuffA
PeekMessageW
GetClassNameW
GetDlgItemTextW
GetWindowTextW
DrawIcon
GetWindowLongW
GetCursorPos
GetKeyboardState
GetDlgItemTextA
GetDlgItem
OpenWindowStationA
SetThreadDesktop
LoadCursorW
GetKeyState
MsgWaitForMultipleObjects
EndDialog
DispatchMessageW
PeekMessageA
ToUnicode
SetProcessWindowStation
kernel32
lstrcatA
GetProcessTimes
GetSystemTime
GetFileTime
LeaveCriticalSection
OpenProcess
HeapFree
CreateMutexW
EnterCriticalSection
ResetEvent
GetVersionExW
FindNextFileW
FindClose
lstrlenA
DisconnectNamedPipe
GetFileSizeEx
GetCommandLineA
CreateFileW
ReleaseMutex
HeapReAlloc
DeleteFileW
GlobalLock
lstrlenW
lstrcatW
lstrcpyW
UnmapViewOfFile
WriteProcessMemory
OpenMutexW
SetFilePointer
CreateProcessW
HeapAlloc
lstrcmpiA
WideCharToMultiByte
GetTimeZoneInformation
GetModuleFileNameW
CloseHandle
MapViewOfFile
CreateDirectoryW
Sleep
GetTickCount
GetLastError
WriteFile
MoveFileExW
GetComputerNameW
GetCurrentProcessId
CreateFileMappingW
GetTempPathW
WaitForSingleObject
InitializeCriticalSection
GetTempFileNameW
SetLastError
GetUserDefaultUILanguage
SetEvent
GetProcessHeap
CreateEventW
GetFileSize
GetLocalTime
Sections
.nkbwf Size: 19KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.belix Size: 5KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taxed Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pgdwn Size: 27KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ