Static task
static1
Behavioral task
behavioral1
Sample
0f1797bcbf161624d4cd3b657b58da57_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0f1797bcbf161624d4cd3b657b58da57_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0f1797bcbf161624d4cd3b657b58da57_JaffaCakes118
-
Size
454KB
-
MD5
0f1797bcbf161624d4cd3b657b58da57
-
SHA1
f9ccaa85f8dcfb127328b086f92339ef500208b7
-
SHA256
57bc1ad867c177be34f74e7de0d9195402a8f63b2e78b78ebd35cc80328470f0
-
SHA512
b1b7bd58aa93d40d665dea6e423b12858ab0ab9ca1bd82a2a66157474fab0b67946aad318d8f311a789bf1859d0dbb3fe0d6ccb6c5be827ad2181960336da8c3
-
SSDEEP
12288:7aKiEJi/psgeszfhufpcehe9e68ZHm1gsiWceBn6GADx:7ipstKwh3w1DJce6G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f1797bcbf161624d4cd3b657b58da57_JaffaCakes118
Files
-
0f1797bcbf161624d4cd3b657b58da57_JaffaCakes118.exe windows:4 windows x86 arch:x86
f7e2cec1fe852dfadccc4aa951c573ce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
StretchDIBits
GetBkMode
SetWorldTransform
SelectObject
GdiGetBatchLimit
CreateMetaFileW
user32
CascadeWindows
CharLowerBuffA
DrawAnimatedRects
PeekMessageA
GetClassNameW
GetCursorPos
SetWindowTextW
GetMenuItemRect
GetDoubleClickTime
GetGuiResources
EnumDesktopWindows
ScreenToClient
GetClassLongW
ExcludeUpdateRgn
ToAscii
SetWindowLongW
PaintDesktop
UnhookWinEvent
RealChildWindowFromPoint
DefMDIChildProcW
SwitchToThisWindow
UnhookWindowsHook
LoadMenuA
AdjustWindowRectEx
shell32
ShellExecuteW
ShellExecuteExW
ShellExecuteExA
SHGetDiskFreeSpaceA
ShellExecuteA
SHFormatDrive
SHGetSpecialFolderLocation
CheckEscapesW
ShellHookProc
SheChangeDirExW
comdlg32
GetOpenFileNameW
ChooseColorW
FindTextW
GetSaveFileNameA
kernel32
EnumSystemLocalesA
TerminateProcess
DeleteCriticalSection
RtlUnwind
CompareStringW
InterlockedIncrement
GetSystemInfo
GetTimeFormatA
LoadLibraryA
GetLocaleInfoA
GetOEMCP
OutputDebugStringA
IsBadWritePtr
SetConsoleCtrlHandler
SetLastError
SetHandleCount
GetUserDefaultLCID
IsValidCodePage
GetStdHandle
HeapReAlloc
ExitProcess
GetACP
CompareStringA
GetCurrentProcessId
WaitCommEvent
GetModuleFileNameA
HeapDestroy
HeapValidate
QueryPerformanceCounter
EnterCriticalSection
FreeEnvironmentStringsW
TlsSetValue
MultiByteToWideChar
GetCurrentThreadId
GetProcAddress
GetLocaleInfoW
GetStringTypeW
TlsGetValue
GetCPInfo
GetEnvironmentStrings
SetStdHandle
GetTickCount
GetStartupInfoA
FreeEnvironmentStringsA
DebugBreak
WideCharToMultiByte
HeapCreate
IsValidLocale
GetModuleHandleA
UnhandledExceptionFilter
GetEnvironmentStringsW
LCMapStringA
LeaveCriticalSection
SetFilePointer
LCMapStringW
VirtualAlloc
GetStringTypeA
ReadConsoleOutputCharacterA
GetCurrentProcess
GetCommandLineA
HeapAlloc
InterlockedExchange
SetEnvironmentVariableA
IsBadReadPtr
TlsFree
WriteFile
VirtualProtect
InitializeCriticalSection
GetLastError
GetModuleFileNameW
GetDateFormatA
GetStartupInfoW
VirtualQuery
GetCommandLineW
InterlockedDecrement
GetTimeZoneInformation
FlushFileBuffers
TlsAlloc
CloseHandle
GetVersionExA
GetFileType
VirtualFree
HeapFree
GetCurrentThread
GetSystemTimeAsFileTime
Sections
.text Size: 166KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 279KB - Virtual size: 279KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ