Static task
static1
Behavioral task
behavioral1
Sample
1a0718b3b79c83ea5b7c891f19d9e36f_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1a0718b3b79c83ea5b7c891f19d9e36f_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1a0718b3b79c83ea5b7c891f19d9e36f_JaffaCakes118
-
Size
30KB
-
MD5
1a0718b3b79c83ea5b7c891f19d9e36f
-
SHA1
048ab4e7c2bf3a00134d14622cdba0e2aa606fc7
-
SHA256
d71bee30b461276fbe38d91267de3b3aef85d91522b027accda63ddf85e987a9
-
SHA512
fecd47126f0eb0249d26897b655e457dce0292323057be705e811bd872e248954b64b0165dceafe948c73ec63636342dc4d527693255950c1afba4d4ba55b0e8
-
SSDEEP
384:9aLa54Q0c6naELE8+uHaEBjGWnu6u5S3BUhHgMPT7sBWeLljv9G8004z9tAV:k2fF2aELE8TjhnG5KBUhHgMPToNLmM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1a0718b3b79c83ea5b7c891f19d9e36f_JaffaCakes118
Files
-
1a0718b3b79c83ea5b7c891f19d9e36f_JaffaCakes118.exe windows:1 windows x86 arch:x86
a7add1f2929975ef98ba18acb8fcf5c1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
user32
DispatchMessageA
TranslateMessage
GetDlgItem
EndDialog
DefWindowProcA
LoadIconA
IsDialogMessageA
GetDlgItemTextA
GetCursor
FillRect
MessageBeep
DialogBoxParamA
CreateDialogParamA
CharUpperA
SendDlgItemMessageA
LoadCursorA
GetSysColorBrush
GetMessageA
SetCursor
GetDC
SetWindowTextA
GetClientRect
SetDlgItemTextA
PostQuitMessage
RegisterClassExA
ReleaseDC
SetWindowLongA
MessageBoxA
SetWindowPos
CheckDlgButton
wsprintfA
kernel32
CopyFileA
SetFileAttributesA
SetCurrentDirectoryA
GetDriveTypeA
ReadFile
GetCurrentDirectoryA
GetModuleHandleA
ExitProcess
GetLogicalDriveStringsA
lstrcmp
WriteFile
GetFileTime
SetUnhandledExceptionFilter
SetLastError
GetFileSize
SetFileTime
CloseHandle
GetFileAttributesA
SetFilePointer
CreateFileA
gdi32
TextOutA
SetTextColor
SetBkMode
SelectObject
GetStockObject
GetObjectA
CreateFontIndirectA
shell32
SHBrowseForFolder
DragQueryFile
DragAcceptFiles
ShellExecuteA
SHGetPathFromIDList
SHGetMalloc
imagehlp
SearchTreeForFile
Sections
CODE Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.PATCH Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE