Static task
static1
Behavioral task
behavioral1
Sample
14eb52d81bad9e8e87d76fdfb050666c_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
14eb52d81bad9e8e87d76fdfb050666c_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
14eb52d81bad9e8e87d76fdfb050666c_JaffaCakes118
-
Size
39KB
-
MD5
14eb52d81bad9e8e87d76fdfb050666c
-
SHA1
32630a92b31d3f1b4471a4a9548a54fe7b85b5da
-
SHA256
6796f0d79a346fcfd3d09f2966105cd73525a5207783b3786c28fc19a893d9b2
-
SHA512
26d971e2a2f7018668787f7ab7bba55984711503eb6b8025da2f2962f4deed7a722ea1ffc24fef489b403dd49ad2e19127ab435825ae2854527dc9fb02c0fb3d
-
SSDEEP
384:mEhiDW+Rq/HjC/T7Ia2ReV4lwagVeaPDBEXT3D:mZq/He/v3LVv/d83D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14eb52d81bad9e8e87d76fdfb050666c_JaffaCakes118
Files
-
14eb52d81bad9e8e87d76fdfb050666c_JaffaCakes118.exe windows:5 windows x86 arch:x86
944cad7ae90fbef52efaf30c6cd333af
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
AreFileApisANSI
BeginUpdateResourceW
BuildCommDCBAndTimeoutsA
BuildCommDCBAndTimeoutsW
CloseHandle
CompareStringA
CompareStringW
CopyFileW
CreateDirectoryExW
CreateDirectoryW
CreateJobObjectW
CreateMailslotW
CreateSemaphoreW
CreateToolhelp32Snapshot
DefineDosDeviceA
DeleteVolumeMountPointA
DeviceIoControl
DuplicateHandle
EnumCalendarInfoExA
EnumCalendarInfoExW
EnumResourceLanguagesW
EnumResourceTypesW
EnumSystemCodePagesW
FatalAppExitA
FileTimeToLocalFileTime
FillConsoleOutputCharacterA
FindFirstFileExW
FindNextVolumeMountPointA
FindNextVolumeW
FindResourceExA
FlushFileBuffers
FoldStringA
FormatMessageW
GenerateConsoleCtrlEvent
GetAtomNameA
GetAtomNameW
GetCommMask
GetCompressedFileSizeW
GetConsoleCP
GetConsoleOutputCP
GetDiskFreeSpaceExA
GetExitCodeThread
GetFileAttributesA
GetLocalTime
GetLocaleInfoA
GetStartupInfoW
GetOEMCP
GetStdHandle
GetTapeStatus
GetThreadContext
GetTimeFormatW
GetVersionExA
GetWindowsDirectoryA
GlobalUnfix
HeapFree
IsBadCodePtr
IsDebuggerPresent
IsValidLanguageGroup
LoadLibraryExW
LocalLock
LocalShrink
MapViewOfFile
Module32FirstW
OpenEventA
OpenWaitableTimerA
Process32Next
PulseEvent
ReadConsoleA
ReadConsoleOutputCharacterA
ReadConsoleOutputW
RtlFillMemory
SearchPathW
SetCommTimeouts
SetComputerNameA
SetComputerNameExA
SetFileTime
SetInformationJobObject
SetLocalTime
SetSystemTimeAdjustment
SetTapeParameters
SetThreadExecutionState
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualFreeEx
VirtualLock
WritePrivateProfileSectionA
WriteProfileStringW
_llseek
lstrcpyA
lstrcpyn
lstrcpynW
lstrlen
GetNumberOfConsoleMouseButtons
ExitProcess
msvcrt
memset
user32
HideCaret
CascadeChildWindows
CharLowerA
CharNextA
CharUpperA
CharUpperBuffW
ChildWindowFromPointEx
CloseClipboard
CloseWindow
CopyAcceleratorTableA
CopyImage
CountClipboardFormats
CreateIconIndirect
DdeConnectList
DdeEnableCallback
DeferWindowPos
DestroyMenu
DlgDirListA
DlgDirListComboBoxA
DlgDirListComboBoxW
DrawEdge
DrawFocusRect
DrawFrame
DrawStateA
DrawStateW
EmptyClipboard
EnumWindows
FindWindowExA
GetAltTabInfo
GetAncestor
GetCapture
GetCaretBlinkTime
GetClassInfoW
GetClassLongA
GetClipCursor
GetClipboardViewer
GetDialogBaseUnits
GetDlgItemInt
GetKeyboardLayoutNameW
GetLastActivePopup
GetMenuItemID
GetMenuItemRect
GetMenuStringW
GetMessageW
GetParent
GetProcessDefaultLayout
GetScrollRange
GetWindow
GrayStringA
BroadcastSystemMessageW
HiliteMenuItem
IMPQueryIMEW
InsertMenuW
IsWindowVisible
KillTimer
LoadCursorFromFileW
LoadMenuIndirectW
LoadStringA
LockSetForegroundWindow
MenuItemFromPoint
MessageBoxIndirectA
OemToCharBuffW
PostMessageW
PostQuitMessage
PostThreadMessageW
RealGetWindowClass
RedrawWindow
RegisterClassW
RegisterDeviceNotificationA
RemoveMenu
ReplyMessage
SendDlgItemMessageW
SendMessageTimeoutA
SendNotifyMessageA
SendNotifyMessageW
SetDebugErrorLevel
SetDlgItemTextW
SetDoubleClickTime
SetMenuItemInfoA
SetParent
SetRectEmpty
SetUserObjectInformationA
SetUserObjectInformationW
SetWindowLongW
SetWindowWord
SetWindowsHookA
SetWindowsHookW
ShowScrollBar
SystemParametersInfoA
TabbedTextOutA
ToAsciiEx
TranslateAccelerator
UpdateLayeredWindow
WINNLSGetIMEHotkey
WindowFromPoint
advapi32
RegOpenKeyW
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text6 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
awtwa1 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
awtwa2 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.awtwa3 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.awtwa4 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.awtwa5 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.awtwa6 Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ