Static task
static1
Behavioral task
behavioral1
Sample
1bc2e0c7d638062f59c71fa41a026bf8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1bc2e0c7d638062f59c71fa41a026bf8_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1bc2e0c7d638062f59c71fa41a026bf8_JaffaCakes118
-
Size
120KB
-
MD5
1bc2e0c7d638062f59c71fa41a026bf8
-
SHA1
b026c78edd78f8c0d02a52b7fc6fda0a8b36b40b
-
SHA256
b4238f3cab7630b8fd43f2f2685e4760202b6dff2a7a74d1716edb7095e05b41
-
SHA512
8b98abffba8385384d87850af56f2f8ed4d1130ab6707ab8237113eb64bdc21521cac44bb1252ff1b1fc91fc86609822e489bee0c06d4679957f648b07043396
-
SSDEEP
3072:qeNMFfuAwjh2oDM6oW5qqr4fab8/c8s6yFwJT0:6ZwYdqlr4fabn8sR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1bc2e0c7d638062f59c71fa41a026bf8_JaffaCakes118
Files
-
1bc2e0c7d638062f59c71fa41a026bf8_JaffaCakes118.exe windows:4 windows x86 arch:x86
6e4a72bd999820936a19ab8aec09f7ab
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
GetUserDefaultLangID
CreateMutexA
InitializeCriticalSection
GetStartupInfoA
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WinExec
lstrcpyA
lstrcpynA
lstrcatA
LocalFree
Sleep
ReadFile
GetCurrentProcess
CreatePipe
DuplicateHandle
CreateProcessA
CreateThread
ResumeThread
WaitForSingleObject
CloseHandle
lstrlenA
GetVersionExA
GetModuleHandleA
GetLastError
FormatMessageA
user32
LoadImageA
RegisterClassExA
CreateWindowExA
DefWindowProcA
SetTimer
IsWindow
DestroyIcon
EnableWindow
GetSysColor
FillRect
DialogBoxParamA
SetWindowTextA
EndDialog
ShowWindow
DispatchMessageA
TranslateMessage
GetMessageA
RegisterWindowMessageA
PostMessageA
PostQuitMessage
MessageBoxA
LoadStringA
GetDlgItem
SetFocus
CharLowerA
FindWindowA
GetWindowThreadProcessId
SendMessageA
MessageBeep
SetCursor
GetWindowRect
SystemParametersInfoA
GetSystemMetrics
SetWindowPos
SetForegroundWindow
GetCursorPos
TrackPopupMenu
DestroyMenu
CreatePopupMenu
InsertMenuItemA
DestroyCursor
gdi32
DeleteObject
CreateCompatibleDC
SelectObject
BitBlt
TextOutA
SetBkColor
SetTextColor
DeleteDC
GetTextMetricsA
comctl32
ord17
ord6
advapi32
OpenSCManagerA
RegQueryValueExA
RegEnumKeyA
RegOpenKeyExA
OpenServiceA
ControlService
QueryServiceStatus
CloseServiceHandle
StartServiceA
RegConnectRegistryA
RegCloseKey
shell32
ShellExecuteA
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetMalloc
Shell_NotifyIconA
ole32
CoUninitialize
CoInitialize
msvcrt
free
sprintf
strstr
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
_strupr
__setusermatherr
_adjust_fdiv
__p__fmode
__set_app_type
_except_handler3
_controlfp
_strdup
__p__commode
Sections
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rrdata Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE