Static task
static1
Behavioral task
behavioral1
Sample
27f4d2b45968728e5a04476b1c3a70f8_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
27f4d2b45968728e5a04476b1c3a70f8_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
27f4d2b45968728e5a04476b1c3a70f8_JaffaCakes118
-
Size
398KB
-
MD5
27f4d2b45968728e5a04476b1c3a70f8
-
SHA1
28da48fea35c4cb2024af94b4926c22a611b3bc4
-
SHA256
9b26c8e1ce9d5e5500f1446b7295e009098446af0106b8fd26f612097721e7ea
-
SHA512
f8f66e6852ead160e257a81030c5792c51c438ee66fffeb0a3b4cf1ef1927f3e47c8bc2acda013b2a760c1dad5e9e9517154987fc33ecdbf6791f62342eac242
-
SSDEEP
12288:J8KzI7FH8Yor5KcgvOZCXCLK9VUt+U6ZL:KK02YxS46rOL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 27f4d2b45968728e5a04476b1c3a70f8_JaffaCakes118
Files
-
27f4d2b45968728e5a04476b1c3a70f8_JaffaCakes118.exe windows:5 windows x86 arch:x86
4615ab91f6e914e629328831238adcc0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
shlwapi
ord437
ord186
ole32
CoAllowSetForegroundWindow
CoUninitialize
StringFromIID
StringFromCLSID
CoInitialize
CoRegisterClassObject
kernel32
lstrlenW
FindNextFileW
SetUnhandledExceptionFilter
ExitThread
HeapDestroy
EnterCriticalSection
DuplicateHandle
GetSystemDirectoryW
VirtualAllocEx
CreateMutexW
LeaveCriticalSection
SetLastError
GetTickCount
LocalFileTimeToFileTime
GetCommandLineW
DeleteFileW
GetStartupInfoW
MultiByteToWideChar
GetModuleFileNameW
ResetEvent
LocalFree
SetCurrentDirectoryW
SetEvent
SetEvent
lstrcmpiW
FreeLibrary
CreateEventA
WriteFile
CreateEventW
CreateDirectoryW
DeleteCriticalSection
GetProcAddress
GetSystemTimeAsFileTime
LoadResource
TerminateProcess
WaitForSingleObject
user32
CharNextW
SendMessageW
LoadIconW
GetDesktopWindow
SendNotifyMessageW
CopyImage
DialogBoxParamW
GetWindowThreadProcessId
MoveWindow
RegisterWindowMessageW
CallWindowProcW
DestroyAcceleratorTable
wsprintfW
MonitorFromRect
DrawIconEx
PostQuitMessage
InflateRect
GetWindowTextLengthW
BeginPaint
FillRect
MonitorFromWindow
LoadCursorW
MessageBeep
GetSysColor
GetIconInfo
EndDialog
MessageBoxIndirectW
SetWindowTextW
MapDialogRect
SetWindowPos
MsgWaitForMultipleObjects
GetPropW
IsRectEmpty
GetWindowRect
RegisterClassW
CopyRect
gdi32
CreateHalftonePalette
DeleteDC
CreatePen
GetDeviceCaps
Ellipse
Rectangle
advapi32
OpenSCManagerW
RegEnumKeyExW
RegOpenKeyExW
CloseServiceHandle
gdiplus
GdipGetImageWidth
GdipGetImageDecodersSize
GdipCreateHBITMAPFromBitmap
GdipImageRotateFlip
GdiplusShutdown
GdipDeleteGraphics
GdipSaveImageToFile
GdipCreateBitmapFromHBITMAP
GdipAlloc
msvcrt
_adjust_fdiv
__set_app_type
exit
free
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_XcptFilter
_exit
shell32
ord152
ord16
SHOpenFolderAndSelectItems
SHGetFileInfoW
SHGetFolderPathW
Sections
.text Size: 250KB - Virtual size: 250KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 138KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 344KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ