Static task
static1
Behavioral task
behavioral1
Sample
252fa26937f3c5edbe16104609c1ae41_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
252fa26937f3c5edbe16104609c1ae41_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
252fa26937f3c5edbe16104609c1ae41_JaffaCakes118
-
Size
255KB
-
MD5
252fa26937f3c5edbe16104609c1ae41
-
SHA1
5b8120330d68f8dd7a86bec8eeec2b7479acd9f4
-
SHA256
f3d0ece4cfc09e304388322d693afdb840fa738be1563a527b3bf5a98f1a7cf9
-
SHA512
8d14f2dbf7c84221483ecfe79ceb17ba138861177c40112c7e800e6f8eb9de3941c1115737388f9967845608bc3d7eb13d99c2d963be04ed1a9d4e5193b9ac29
-
SSDEEP
6144:8WFLIoTvEFeRIedJ87Zn4k8q+Xj+F8IH7O/E:nhT6eGmC4nz+F8IbO/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 252fa26937f3c5edbe16104609c1ae41_JaffaCakes118
Files
-
252fa26937f3c5edbe16104609c1ae41_JaffaCakes118.exe windows:4 windows x86 arch:x86
fd0f06ecbd5d0bb74c2399a2769ad23d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EnableWindow
SendMessageW
ClientToScreen
GetWindowThreadProcessId
IsIconic
IsWindow
EnableMenuItem
GetForegroundWindow
GetParent
RegisterWindowMessageW
SetCursor
LoadCursorW
GetWindowLongW
DefWindowProcW
LoadStringW
GetClientRect
FindWindowW
GetActiveWindow
SetForegroundWindow
SystemParametersInfoW
MonitorFromWindow
SetWindowPos
GetDesktopWindow
CallWindowProcW
GetWindowRect
EnumChildWindows
TrackPopupMenuEx
AttachThreadInput
FlashWindow
MonitorFromPoint
GetSystemMenu
GetSystemMetrics
LoadIconW
GetWindow
SetWindowLongW
ShowWindow
CharNextW
PostMessageW
GetMonitorInfoW
GetDlgItem
MapWindowPoints
AllowSetForegroundWindow
GetClassNameW
IsWindowEnabled
ole32
CoCreateInstance
CoTaskMemFree
CLSIDFromProgID
CoGetMalloc
StringFromCLSID
CoTaskMemAlloc
CoTaskMemRealloc
oleaut32
VarUI4FromStr
kernel32
HeapSize
SetCurrentDirectoryW
OutputDebugStringW
LocalFree
VirtualAlloc
GetCurrentThreadId
GetTempPathW
FindResourceW
IsDebuggerPresent
CloseHandle
UnhandledExceptionFilter
LeaveCriticalSection
LocalAlloc
FlushInstructionCache
FindResourceExW
SizeofResource
GetCurrentDirectoryW
RaiseException
GetFileSize
lstrcmpiW
LockResource
lstrlenA
GetShortPathNameW
DeleteCriticalSection
lstrlenW
ReadFile
ProcessIdToSessionId
WideCharToMultiByte
GetModuleHandleW
LoadLibraryExW
HeapReAlloc
DisableThreadLibraryCalls
LoadResource
EnterCriticalSection
SetUnhandledExceptionFilter
GetProcessHeap
HeapAlloc
IsProcessorFeaturePresent
FormatMessageW
GetUserDefaultLangID
VirtualFree
HeapFree
CreateFileW
GetSystemTimeAsFileTime
WTSGetActiveConsoleSessionId
HeapDestroy
FreeLibrary
IsValidLocale
VirtualAllocEx
IsBadWritePtr
comdlg32
GetOpenFileNameW
CommDlgExtendedError
userenv
GetAllUsersProfileDirectoryW
GetProfileType
GetProfilesDirectoryW
EnterCriticalPolicySection
DeleteProfileA
panmap
DllCanUnloadNow
Sections
.text Size: 223KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.omiFFHX Size: 1024B - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.TtiEFEX Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hHrqLvX Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pPtnLvX Size: 1024B - Virtual size: 871B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hsalxlv Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rWlDynv Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ