Static task
static1
Behavioral task
behavioral1
Sample
168bf8ec3e188d7249c610054d93bca1_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
168bf8ec3e188d7249c610054d93bca1_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
168bf8ec3e188d7249c610054d93bca1_JaffaCakes118
-
Size
42KB
-
MD5
168bf8ec3e188d7249c610054d93bca1
-
SHA1
04c5899a6b00ea29786fd7845d62879f80b3b3ab
-
SHA256
ea9cc6f113fa453e8a4322b8edf6fe79969061b7f451ef4837a29d7b82a743d9
-
SHA512
ba2a072fa9d7fd1365605be309842f4428c778563c4f0a2c6f18ed299cbb54e607471f297726f0bd7855c488b664fcd3a5dae2d917a740723668002fc87e21df
-
SSDEEP
768:NcN759v6FilPIfxpFH8+C8UuvBsjotys4Zx/cOD1IkOyTAPizhe7Po:Q59UZLCFYtys4zcOZI/Kh6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 168bf8ec3e188d7249c610054d93bca1_JaffaCakes118
Files
-
168bf8ec3e188d7249c610054d93bca1_JaffaCakes118.exe windows:4 windows x86 arch:x86
e87199d5aaccb364feea62787a73d8b6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
WritePrivateProfileSectionW
GetLocaleInfoA
UnregisterConsoleIME
GetSystemDirectoryA
GetThreadTimes
VirtualProtect
VirtualProtectEx
GetProfileSectionA
GetFullPathNameA
GetLastError
LocalFileTimeToFileTime
MultiByteToWideChar
user32
SetDlgItemTextA
User32InitializeImmEntryTable
GetMenu
IsCharAlphaNumericA
CharToOemW
GetWindowRect
DdeDisconnectList
SetCapture
MessageBeep
DrawMenuBarTemp
SetSystemMenu
ShowWindow
SetWindowRgn
LoadBitmapW
GetWindowPlacement
WindowFromPoint
ReplyMessage
GetMessageW
GrayStringA
IMPGetIMEA
BringWindowToTop
DragDetect
InvalidateRgn
ShowScrollBar
LoadCursorA
IsCharAlphaW
EnumDisplayDevicesW
IsHungAppWindow
InSendMessage
DialogBoxIndirectParamAorW
CreateMDIWindowA
QuerySendMessage
CreatePopupMenu
CascadeChildWindows
DrawTextExW
GetDlgItemTextA
SetConsoleReserveKeys
DlgDirListComboBoxA
GetClassInfoExA
ScreenToClient
ArrangeIconicWindows
EnumDisplaySettingsExA
MonitorFromPoint
MenuItemFromPoint
GetMessageA
LoadCursorW
DefDlgProcW
RegisterHotKey
InvalidateRect
DdeReconnect
DefMDIChildProcW
GetClipboardData
EndMenu
GetWindowWord
gdi32
SaveDC
GetViewportOrgEx
EngStrokeAndFillPath
EngMultiByteToUnicodeN
ExtSelectClipRgn
RemoveFontResourceA
EngGetPrinterDataFileName
SelectFontLocal
CreateDiscardableBitmap
GdiConvertBitmap
GetStockObject
CombineTransform
GetMetaFileW
GetEUDCTimeStampExW
CLIPOBJ_cEnumStart
EngLoadModule
MoveToEx
AddFontResourceExW
SetMetaFileBitsEx
PolyPolygon
CreateFontIndirectA
CreateFontIndirectW
DeleteColorSpace
SetColorSpace
GdiDeleteLocalDC
STROBJ_bGetAdvanceWidths
CreatePatternBrush
GdiEntry6
GetCharABCWidthsI
GdiStartPageEMF
SetGraphicsMode
GetTextExtentPointI
CloseEnhMetaFile
SetViewportOrgEx
GetCharABCWidthsA
DeleteMetaFile
RemoveFontResourceTracking
FONTOBJ_pfdg
comdlg32
PrintDlgW
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
WantArrows
LoadAlterBitmap
PageSetupDlgW
ChooseFontW
ChooseColorW
dwOKSubclass
FindTextA
ReplaceTextW
PrintDlgExA
psapi
EmptyWorkingSet
GetMappedFileNameW
GetProcessMemoryInfo
EnumProcessModules
EnumDeviceDrivers
QueryWorkingSet
GetModuleFileNameExW
GetModuleBaseNameW
GetDeviceDriverBaseNameA
InitializeProcessForWsWatch
GetModuleBaseNameA
GetModuleFileNameExA
EnumProcesses
GetModuleInformation
GetDeviceDriverFileNameA
GetDeviceDriverFileNameW
GetWsChanges
comctl32
ImageList_GetBkColor
ImageList_GetIconSize
ImageList_Duplicate
ImageList_LoadImage
ImageList_DrawEx
ImageList_GetFlags
FlatSB_SetScrollRange
FlatSB_GetScrollRange
DllGetVersion
ImageList_Destroy
ImageList_Replace
Sections
.text Size: 4KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE