Static task
static1
Behavioral task
behavioral1
Sample
2497a56d41fb058212a532062ebcd4f3_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2497a56d41fb058212a532062ebcd4f3_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
2497a56d41fb058212a532062ebcd4f3_JaffaCakes118
-
Size
49KB
-
MD5
2497a56d41fb058212a532062ebcd4f3
-
SHA1
19d9567e65a22238ee69abda1ec03ab607519aaa
-
SHA256
fec0849852fdccf2ac13cd1755ac2e6fbb0f92fc8f1b1b37f3fc37391ab2d592
-
SHA512
e94872da29f49376c2ca6f80168bd40fb4e6818ce9e0423a50850f83c95a90d072013e759aea3bce4f9db8f3f4f70c7ca5e04ff261350a590cb82003e13fe360
-
SSDEEP
768:lIYJAKG5Uh8AzVel9e8rbq7W2bJh8kvSiV7l8iHjmi3sPFGNKXT1yJ0SLLms:lIFKG5Uh8Azsrrbq71dukvSUBHjJx+h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2497a56d41fb058212a532062ebcd4f3_JaffaCakes118
Files
-
2497a56d41fb058212a532062ebcd4f3_JaffaCakes118.exe windows:5 windows x86 arch:x86
b984e8a09c4cd74af5d4187a8f898173
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SendMessageW
DispatchMessageW
GetClipboardData
GetMessageW
ToUnicode
GetKeyState
GetClassNameW
GetCursorPos
OpenWindowStationA
PeekMessageA
GetWindowLongW
CloseDesktop
CharLowerBuffA
GetForegroundWindow
LoadCursorW
FindWindowExW
GetWindowThreadProcessId
ExitWindowsEx
GetIconInfo
GetKeyboardState
GetDlgItem
CloseWindowStation
SetThreadDesktop
GetDlgItemTextA
PeekMessageW
DrawIcon
EndDialog
MsgWaitForMultipleObjects
SetProcessWindowStation
GetMessageA
GetDlgItemTextW
GetWindowTextW
OpenDesktopA
kernel32
Sleep
GetModuleHandleA
CopyFileW
lstrcatW
GetModuleFileNameW
GetCurrentThreadId
ReadFile
SetLastError
UnmapViewOfFile
SetThreadPriority
WaitForSingleObject
SetFilePointer
GetFileSizeEx
GetFileSize
ReleaseMutex
GetProcessHeap
OpenProcess
GetLogicalDrives
FindClose
GetVersionExW
SetFileTime
MoveFileExW
GetTimeZoneInformation
WriteFile
GetSystemTimeAsFileTime
DeleteFileW
lstrcpyW
lstrcatA
GetThreadPriority
WideCharToMultiByte
InitializeCriticalSection
HeapReAlloc
CreateFileMappingW
GetTickCount
SystemTimeToFileTime
GetCommandLineA
MultiByteToWideChar
GetProcessTimes
lstrlenW
GetCurrentProcessId
ResetEvent
CloseHandle
GetSystemTime
WriteProcessMemory
GetLocalTime
SetEndOfFile
GetDriveTypeW
lstrcmpiW
MapViewOfFile
FindFirstFileW
CreateFileW
SetFileAttributesW
IsBadReadPtr
lstrcpynW
FindResourceW
GetTempFileNameW
DisconnectNamedPipe
Sections
.ulwvcz Size: 39KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dyn Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adkh Size: 7KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ