Static task
static1
Behavioral task
behavioral1
Sample
0e68bba651cf59138d8e3a3b3ef97d0c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e68bba651cf59138d8e3a3b3ef97d0c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0e68bba651cf59138d8e3a3b3ef97d0c_JaffaCakes118
-
Size
73KB
-
MD5
0e68bba651cf59138d8e3a3b3ef97d0c
-
SHA1
32f3503eead7dd320651dcb9f7da28989fe2cbe6
-
SHA256
6b313354f059ca9e988d736f60132e21ffe77fe0b6168a1c0f06de6f52c7eb0b
-
SHA512
fd5357db7603ed8a7dea17489b6ebfebe5e2801431d5798ea90689586427fb5178e6e90850d7d6a36a61123e9490828f136b9a31f233e7db4160d936b05f242a
-
SSDEEP
1536:jyLe6CeDFPfGHTzDN9257umgEY9+/qEuggYVTl39B:H2Pap9257vvYZEgYj3T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e68bba651cf59138d8e3a3b3ef97d0c_JaffaCakes118
Files
-
0e68bba651cf59138d8e3a3b3ef97d0c_JaffaCakes118.exe windows:5 windows x86 arch:x86
5409bfa36670f16293ca8259ec4c8cde
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GrayStringW
ShowCaret
MapDialogRect
SetPropW
IMPGetIMEA
DlgDirSelectExA
DispatchMessageA
DdeClientTransaction
TranslateMessageEx
CreateMDIWindowA
DdeUnaccessData
CallNextHookEx
GetUserObjectInformationW
RedrawWindow
CountClipboardFormats
GetCaretPos
GetPriorityClipboardFormat
GetMenuStringA
EnumDisplayMonitors
CheckRadioButton
ChangeMenuA
SendInput
GetOpenClipboardWindow
DlgDirListW
AllowSetForegroundWindow
CreateMenu
LoadKeyboardLayoutW
GetDC
UnhookWindowsHook
InvertRect
PrivateExtractIconExW
UnregisterClassA
kernel32
OpenProfileUserMapping
GetVolumePathNameA
RegisterWaitForSingleObjectEx
VirtualQuery
HeapLock
CreateRemoteThread
EnumResourceLanguagesW
GetTapeParameters
PeekConsoleInputW
DeleteCriticalSection
LocalUnlock
SetCommMask
WideCharToMultiByte
FindVolumeMountPointClose
WaitNamedPipeW
MulDiv
GetDateFormatA
CallNamedPipeW
OpenThread
QueryPerformanceCounter
CreateDirectoryW
VDMConsoleOperation
CreateToolhelp32Snapshot
Module32Next
ExpandEnvironmentStringsW
GetOEMCP
CloseHandle
SetFileAttributesW
GetCPInfoExW
GetConsoleAliasExesA
_lread
BuildCommDCBAndTimeoutsA
GetSystemTimeAdjustment
EnumSystemCodePagesW
GetCurrencyFormatA
GetACP
SetConsoleKeyShortcuts
ReadFile
HeapUnlock
GetConsoleMode
InterlockedCompareExchange
GetLogicalDriveStringsW
GetFileAttributesExW
GetLocalTime
GetPrivateProfileIntW
EnterCriticalSection
SearchPathW
CancelIo
CreateHardLinkA
lstrcatW
lstrcmp
EndUpdateResourceW
CreateMailslotW
IsDebuggerPresent
GetLastError
VirtualProtect
gdi32
BRUSHOBJ_ulGetBrushColor
AddFontResourceTracking
EnumICMProfilesA
GetMetaFileW
ExtFloodFill
GdiSetAttrs
SetMapperFlags
RectVisible
GetClipRgn
GdiPlayJournal
EngAcquireSemaphore
EnumEnhMetaFile
SetSystemPaletteUse
GdiConvertMetaFilePict
RealizePalette
GdiStartPageEMF
GdiEntry10
PolylineTo
GetGraphicsMode
GdiQueryFonts
WidenPath
GetLogColorSpaceW
PolyTextOutA
GdiConvertRegion
PATHOBJ_bEnum
OffsetRgn
GdiConvertDC
ArcTo
GetWorldTransform
GdiGetSpoolMessage
GetBkColor
EngCreatePalette
comdlg32
FindTextW
PrintDlgExW
GetFileTitleW
GetSaveFileNameW
CommDlgExtendedError
PrintDlgA
Ssync_ANSI_UNICODE_Struct_For_WOW
dwLBSubclass
PageSetupDlgA
ChooseColorA
GetOpenFileNameW
psapi
EnumProcesses
GetDeviceDriverFileNameA
GetWsChanges
GetModuleFileNameExA
GetDeviceDriverBaseNameA
GetDeviceDriverFileNameW
GetDeviceDriverBaseNameW
GetModuleBaseNameW
GetModuleFileNameExW
GetModuleInformation
comctl32
ImageList_Write
GetMUILanguage
ImageList_Draw
ImageList_GetIcon
CreateStatusWindowW
FlatSB_GetScrollInfo
ImageList_GetImageRect
ImageList_GetDragImage
FlatSB_ShowScrollBar
DestroyPropertySheetPage
ImageList_Remove
InitCommonControlsEx
ImageList_SetImageCount
Sections
.text Size: 5KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 62KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE