Static task
static1
Behavioral task
behavioral1
Sample
181a8fb2419899c3f262b814ec0fe4d0_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
181a8fb2419899c3f262b814ec0fe4d0_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
181a8fb2419899c3f262b814ec0fe4d0_JaffaCakes118
-
Size
220KB
-
MD5
181a8fb2419899c3f262b814ec0fe4d0
-
SHA1
7980b6bff0d275ccd99d5b865750582be357a956
-
SHA256
f83dcd4c241195e11d29380c5ec20fb095e28bb1068340984d9b25b03aeb180a
-
SHA512
f6ae9368c8b27a104202f2e9377105afd74a954075ed0015d8cf87d2aa0de03f980d84db2321e7df4d3a7913dec106f1284b943a847b6193f7ad0f40c143df77
-
SSDEEP
6144:EqzWzFlBr4vPQKe3BU/EjOwe9+7yhxFl+/:EyalBsvPVwB2Ewo7KxFl+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 181a8fb2419899c3f262b814ec0fe4d0_JaffaCakes118
Files
-
181a8fb2419899c3f262b814ec0fe4d0_JaffaCakes118.exe windows:4 windows x86 arch:x86
e0d8327ef0d36c268fa3490c9a65d61f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetUnhandledExceptionFilter
IsBadCodePtr
LoadLibraryA
ReadDirectoryChangesW
GetMailslotInfo
GetCPInfo
GetLocaleInfoW
GetProcAddress
OpenSemaphoreA
BeginUpdateResourceW
user32
GetTopWindow
CopyRect
EndDialog
SetMenu
SetWindowRgn
GetForegroundWindow
RegisterClassW
AdjustWindowRect
GetWindowTextLengthW
IsChild
FlashWindow
GetCaretPos
CreateDesktopW
MessageBoxA
GetMenuItemInfoA
MonitorFromRect
RegisterClassA
GetWindowRect
CharUpperW
EnableWindow
wsprintfW
wsprintfA
DialogBoxIndirectParamA
gdi32
SetPolyFillMode
EndDoc
UpdateColors
SetWinMetaFileBits
SetStretchBltMode
CreateMetaFileA
AngleArc
Arc
GetOutlineTextMetricsW
CreateDCW
GetEnhMetaFilePaletteEntries
StartDocW
GetDIBColorTable
GetDIBits
GetFontUnicodeRanges
advapi32
RegQueryValueA
RegQueryValueW
RegOpenKeyA
RegReplaceKeyW
RegDeleteKeyW
RegOpenKeyA
RegOpenKeyW
RegDeleteValueW
RegSaveKeyW
RegDeleteValueA
shlwapi
PathIsDirectoryA
SHOpenRegStream2A
SHDeleteKeyA
StrRetToBSTR
SHLoadIndirectString
PathFindOnPathA
PathMakePrettyA
StrDupA
PathIsURLW
PathStripToRootW
ws2_32
getservbyname
getprotobyname
Sections
.WnHBb Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.NIjAf Size: 3KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.WWddtB Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zYU Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.IbVLgP Size: 2KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Uv Size: 3KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.TqBKiH Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 189KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ