Static task
static1
Behavioral task
behavioral1
Sample
14a4be5533259018b804cf2516d9f7cc_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
14a4be5533259018b804cf2516d9f7cc_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
14a4be5533259018b804cf2516d9f7cc_JaffaCakes118
-
Size
172KB
-
MD5
14a4be5533259018b804cf2516d9f7cc
-
SHA1
a8cbb042b3370642903637fe0e8deb1b6a4642e6
-
SHA256
ca4500d832dddc7d29fd3df3f28d137c4ec03213c2ea3e396a883e18e8516df2
-
SHA512
51ece7204eb60af0a1838971a23bb1f9c309dc853989753937099721b31155ccc6b3e482fcddcb33ef959002a9bf6246cf571a7a528449e4a43f54392414f7a4
-
SSDEEP
3072:XSt9KHnxuFsTUEtv4e4BQTVZFa16P1DgVsUyNiGaX7eDfLhg2bkVXp2:XStgH4FkUEY+Ts16tUVsYG87gzLe5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14a4be5533259018b804cf2516d9f7cc_JaffaCakes118
Files
-
14a4be5533259018b804cf2516d9f7cc_JaffaCakes118.exe windows:4 windows x86 arch:x86
407b835936c1ac9ac3510ff0abd3a0d7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
comdlg32
GetSaveFileNameW
shell32
ShellExecuteW
advapi32
RegOpenKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegEnumKeyW
RegQueryValueExW
RegDeleteKeyA
msvfw32
ICInfo
user32
GetMenuStringW
GetWindowRect
GetWindowLongW
SetWindowTextW
EndDialog
AdjustWindowRect
SetRect
MoveWindow
MessageBoxW
SetWindowsHookExW
GetDlgItem
GetWindowInfo
GetSysColor
SendMessageW
comctl32
ImageList_Draw
ImageList_Create
ImageList_ReplaceIcon
ImageList_Destroy
gdi32
GetTextMetricsW
CreatePatternBrush
DeleteObject
SetBkMode
SetViewportExtEx
CreateCompatibleDC
SetBkColor
SelectObject
MoveToEx
StretchBlt
SetTextColor
GetDeviceCaps
CreateDCW
CreateCompatibleBitmap
LineTo
DeleteDC
CreateSolidBrush
CreateFontW
CreatePen
GetObjectW
SetViewportOrgEx
GetCharWidthW
BitBlt
ExtCreateRegion
CombineRgn
CreateDIBSection
GetStockObject
kernel32
DeleteFileW
CreateFileA
GetModuleHandleA
GetVDMCurrentDirectories
LoadLibraryW
WriteFile
GetUserDefaultUILanguage
MoveFileW
SetThreadPriorityBoost
CreateProcessW
EnumResourceNamesW
SetFilePointer
GetCurrentProcessId
MultiByteToWideChar
WideCharToMultiByte
GetProcAddress
FindClose
SetUnhandledExceptionFilter
ReadFile
GetLocalTime
OutputDebugStringW
ExitProcess
FreeLibrary
FindFirstFileW
HeapAlloc
HeapFree
Sections
.text Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imul Size: 1024B - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ