Static task
static1
Behavioral task
behavioral1
Sample
164e32cf14aa33ef6caeaea7c4edb408_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
164e32cf14aa33ef6caeaea7c4edb408_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
164e32cf14aa33ef6caeaea7c4edb408_JaffaCakes118
-
Size
255KB
-
MD5
164e32cf14aa33ef6caeaea7c4edb408
-
SHA1
0d6645663245a3f10b8ac6d43062ed1769d1a9a7
-
SHA256
33207b0fb45fec321596acd9fe5dc3d55260fe31cd67325e253877f7daeada33
-
SHA512
611f23fb52ee33d8c78474d71e9e1d098de4d888f3aa33cc80f11c9bb05949ff4fa3f78b01f1d968ce94a31ed25b349f12d8c84893de560f35ee26e5a4a135a6
-
SSDEEP
6144:bWFLIoTvEFeRIedJ87Zn4k8q+Xj+F8IH7O/E:mhT6eGmC4nz+F8IbO/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 164e32cf14aa33ef6caeaea7c4edb408_JaffaCakes118
Files
-
164e32cf14aa33ef6caeaea7c4edb408_JaffaCakes118.exe windows:4 windows x86 arch:x86
fd0f06ecbd5d0bb74c2399a2769ad23d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EnableWindow
SendMessageW
ClientToScreen
GetWindowThreadProcessId
IsIconic
IsWindow
EnableMenuItem
GetForegroundWindow
GetParent
RegisterWindowMessageW
SetCursor
LoadCursorW
GetWindowLongW
DefWindowProcW
LoadStringW
GetClientRect
FindWindowW
GetActiveWindow
SetForegroundWindow
SystemParametersInfoW
MonitorFromWindow
SetWindowPos
GetDesktopWindow
CallWindowProcW
GetWindowRect
EnumChildWindows
TrackPopupMenuEx
AttachThreadInput
FlashWindow
MonitorFromPoint
GetSystemMenu
GetSystemMetrics
LoadIconW
GetWindow
SetWindowLongW
ShowWindow
CharNextW
PostMessageW
GetMonitorInfoW
GetDlgItem
MapWindowPoints
AllowSetForegroundWindow
GetClassNameW
IsWindowEnabled
ole32
CoCreateInstance
CoTaskMemFree
CLSIDFromProgID
CoGetMalloc
StringFromCLSID
CoTaskMemAlloc
CoTaskMemRealloc
oleaut32
VarUI4FromStr
kernel32
HeapSize
SetCurrentDirectoryW
OutputDebugStringW
LocalFree
VirtualAlloc
GetCurrentThreadId
GetTempPathW
FindResourceW
IsDebuggerPresent
CloseHandle
UnhandledExceptionFilter
LeaveCriticalSection
LocalAlloc
FlushInstructionCache
FindResourceExW
SizeofResource
GetCurrentDirectoryW
RaiseException
GetFileSize
lstrcmpiW
LockResource
lstrlenA
GetShortPathNameW
DeleteCriticalSection
lstrlenW
ReadFile
ProcessIdToSessionId
WideCharToMultiByte
GetModuleHandleW
LoadLibraryExW
HeapReAlloc
DisableThreadLibraryCalls
LoadResource
EnterCriticalSection
SetUnhandledExceptionFilter
GetProcessHeap
HeapAlloc
IsProcessorFeaturePresent
FormatMessageW
GetUserDefaultLangID
VirtualFree
HeapFree
CreateFileW
GetSystemTimeAsFileTime
WTSGetActiveConsoleSessionId
HeapDestroy
FreeLibrary
IsValidLocale
VirtualAllocEx
IsBadWritePtr
comdlg32
GetOpenFileNameW
CommDlgExtendedError
userenv
GetAllUsersProfileDirectoryW
GetProfileType
GetProfilesDirectoryW
EnterCriticalPolicySection
DeleteProfileA
panmap
DllCanUnloadNow
Sections
.text Size: 223KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.omiFFHX Size: 1024B - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.TtiEFEX Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hHrqLvX Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pPtnLvX Size: 1024B - Virtual size: 871B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hsalxlv Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rWlDynv Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ