Static task
static1
Behavioral task
behavioral1
Sample
1631834c13900fc63edc68709d832d8a_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1631834c13900fc63edc68709d832d8a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1631834c13900fc63edc68709d832d8a_JaffaCakes118
-
Size
55KB
-
MD5
1631834c13900fc63edc68709d832d8a
-
SHA1
3eac8e06818c276f8901612afc340ce7f0b6fcc0
-
SHA256
169c411b8c576aca7ffc3d2aed9c353334d9fe9a6fddbc0db3455e6856d24262
-
SHA512
d1a1f5b529c560f7d7fc4e085ae4deedd1baf6ef5db7b071d40f019eddcd296f44b2f79478f40d0df18277899d5fdea572ada30934d9d2fdab8a2103d47330c0
-
SSDEEP
768:zPzPgEwXfleHP7n6s9XDCFPQgNWV3gUAZfBZ80FceIeNfE9zP9A0VSsTXyXs:zP6Xm6mXDClPN0AV80en99VXyXs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1631834c13900fc63edc68709d832d8a_JaffaCakes118
Files
-
1631834c13900fc63edc68709d832d8a_JaffaCakes118.exe windows:1 windows x86 arch:x86
3cd6d079953bf94d2981881da2b24d48
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetTextMetricsA
shell32
SHBrowseForFolderA
SHGetDesktopFolder
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
user32
BringWindowToTop
CharUpperBuffA
CreateDialogParamA
DefWindowProcA
DestroyIcon
DestroyWindow
DispatchMessageA
EnableWindow
FindWindowA
GetDC
GetDesktopWindow
GetDlgItem
GetDlgItemInt
GetDlgItemTextA
GetMessageA
GetParent
GetSysColorBrush
GetWindowRect
IsDialogMessageA
IsIconic
LoadCursorA
LoadIconA
MessageBoxA
PeekMessageA
PostMessageA
PostQuitMessage
RegisterClassExA
SendDlgItemMessageA
SendMessageA
SetDlgItemInt
SetDlgItemTextA
SetWindowPos
SetWindowTextA
ShowWindow
TranslateMessage
UnregisterClassA
kernel32
AllocConsole
CloseHandle
CreateEventA
CreateFileA
CreateMutexA
CreateThread
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
ExitThread
FlushFileBuffers
FreeEnvironmentStringsA
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThreadId
GetCurrentThread
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetFullPathNameA
GetLastError
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetOEMCP
GetProcAddress
GetStdHandle
GetSystemDirectoryA
GetTempPathA
GetTickCount
GetVersion
GetWindowsDirectoryA
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
MoveFileA
MultiByteToWideChar
ReleaseMutex
SetConsoleCtrlHandler
SetConsoleTitleA
SetEnvironmentVariableA
SetEnvironmentVariableW
SetEvent
SetFilePointer
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
comctl32
ord17
comdlg32
GetOpenFileNameA
GetSaveFileNameA
Sections
AUTO Size: 37KB - Virtual size:
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DGROUP Size: 5KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 8KB - Virtual size:
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ