Static task
static1
Behavioral task
behavioral1
Sample
2aabbba7187bdbaffdf0e2586f8503bb_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2aabbba7187bdbaffdf0e2586f8503bb_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2aabbba7187bdbaffdf0e2586f8503bb_JaffaCakes118
-
Size
440KB
-
MD5
2aabbba7187bdbaffdf0e2586f8503bb
-
SHA1
81997ceddc1e11bfebc5195d161fb2afca1b3556
-
SHA256
14bd26cb06a3e1647b91e6a93f24f8cce4f009f982c128358afb77097e5e784d
-
SHA512
bdb86f8cebd9ac81e26bc44a8522d72789addc1c7c1edaba735474f79914052d2685ec6ec86afbfdf762b129e6a5558fe3280488f766ef7aae1a6cf5b3d7e659
-
SSDEEP
12288:bGQuqHpMd4qYzM0CBCIX3pDxh//3ifj3vhGRWvebDAT:9VkhFBxZezhGRWvSDA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2aabbba7187bdbaffdf0e2586f8503bb_JaffaCakes118
Files
-
2aabbba7187bdbaffdf0e2586f8503bb_JaffaCakes118.exe windows:5 windows x86 arch:x86
e575c21db8ca121a8efe161e6c004596
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
gdi32
Rectangle
SetLayout
SetTextColor
DeleteDC
CreatePenIndirect
MoveToEx
CreateFontIndirectW
CreateCompatibleBitmap
LineTo
DeleteObject
SetStretchBltMode
GetTextExtentPoint32W
Ellipse
SetBkColor
CreateDIBSection
GetDeviceCaps
SelectPalette
Arc
BitBlt
kernel32
SystemTimeToFileTime
DeleteCriticalSection
GetWindowsDirectoryW
GetFileSize
FreeLibraryAndExitThread
GetCurrentProcessId
Sleep
GetFileAttributesW
ResetEvent
SetFileTime
QueryPerformanceCounter
VirtualAllocEx
SetEvent
FreeLibrary
GetTickCount
lstrcmpW
LoadResource
UnmapViewOfFile
MoveFileW
SizeofResource
CreateFileMappingW
CreateDirectoryW
LocalFree
lstrcpynW
MulDiv
GetCommandLineW
CreateEventW
GetModuleHandleW
TerminateProcess
CreateEventA
lstrcpyW
GetSystemDirectoryW
GlobalAlloc
SetCurrentDirectoryW
EnterCriticalSection
CompareStringW
GetProcAddress
WaitForSingleObject
lstrlenA
FindClose
GetHandleInformation
CreateFileW
LocalAlloc
GetTempPathW
MultiByteToWideChar
LeaveCriticalSection
GetCurrentProcess
CopyFileW
GetCurrentThreadId
DeleteFileW
FindFirstFileW
ReleaseMutex
user32
ReleaseCapture
DialogBoxParamW
CopyIcon
GetMessageW
CopyImage
TranslateMessage
SetWindowTextW
MonitorFromWindow
CallWindowProcW
SetCursor
MessageBeep
CharNextW
GetSysColorBrush
GetWindowThreadProcessId
GetParent
SetWindowPos
GetWindowTextLengthW
WinHelpW
LoadIconW
LoadImageW
CreateWindowExW
SendMessageW
TranslateAcceleratorW
DrawIconEx
DrawTextExW
InvalidateRect
SendNotifyMessageW
GetWindowRect
FrameRect
GetFocus
OffsetRect
DrawFocusRect
BeginPaint
DestroyAcceleratorTable
EndPaint
GetCapture
GetPropW
SetDlgItemTextW
GetSysColor
GetClassInfoW
GetMonitorInfoW
GetCursorPos
SetPropW
IsWindow
SetFocus
LoadCursorW
SendDlgItemMessageW
IsWindowVisible
GetLastActivePopup
PostThreadMessageW
DispatchMessageW
IsDlgButtonChecked
KillTimer
EndDialog
EnableWindow
MessageBoxW
MapDialogRect
GetDlgItem
GetDC
GetSystemMetrics
PeekMessageW
GetWindowTextW
InflateRect
Sections
.text Size: 395KB - Virtual size: 395KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 312KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ