Static task
static1
Behavioral task
behavioral1
Sample
3129ec6bbd6616b4f22eaab2c5f192e5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3129ec6bbd6616b4f22eaab2c5f192e5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3129ec6bbd6616b4f22eaab2c5f192e5_JaffaCakes118
-
Size
21KB
-
MD5
3129ec6bbd6616b4f22eaab2c5f192e5
-
SHA1
141bd7f11ac8482468b8d507cb3306f88e47bb9a
-
SHA256
80a094ed36a5450f85b9594c4a4fab0e290df84254eedaa8ae5b6e6ba3875a37
-
SHA512
d90ec943d5fdc2691a32b604a6ea7d50575132dc170075c1f8c0908310dd17794fef69e650ba92f7d9948c5380a61dace130fa65885cad095c905d4954eb477f
-
SSDEEP
384:kEbtPjcACNBohf/AZb1a91aOQRBPpk1bfPnTavg0x0UhFZj87kguPQ3uqO:pvQyf/Yb1a91ar+pffTz0xlh6PO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3129ec6bbd6616b4f22eaab2c5f192e5_JaffaCakes118
Files
-
3129ec6bbd6616b4f22eaab2c5f192e5_JaffaCakes118.exe windows:4 windows x86 arch:x86
e9399528abee8839e8de2dafbed76445
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
strlen
sprintf
strcmp
strncmp
fclose
fabs
ceil
malloc
floor
free
strcpy
strncpy
strcat
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
HeapAlloc
HeapFree
SetCurrentDirectoryA
GetCurrentThreadId
GetCurrentProcessId
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetLastError
TlsAlloc
LoadLibraryA
GetProcAddress
FreeLibrary
GetVersionExA
FindClose
FindFirstFileA
GetLastError
FindNextFileA
HeapReAlloc
comctl32
InitCommonControls
InitCommonControlsEx
user32
MessageBoxA
GetWindowThreadProcessId
IsWindowVisible
IsWindowEnabled
GetForegroundWindow
EnableWindow
EnumWindows
DestroyWindow
GetSysColor
GetSysColorBrush
GetWindowLongA
PostMessageA
CallWindowProcA
CreateWindowExA
SetWindowLongA
SendMessageA
SetPropA
SetCapture
GetPropA
ReleaseCapture
RemovePropA
GetSystemMetrics
GetWindowTextLengthA
GetWindowTextA
DefWindowProcA
GetParent
RedrawWindow
GetWindow
SetActiveWindow
UnregisterClassA
DestroyAcceleratorTable
LoadIconA
LoadCursorA
RegisterClassA
AdjustWindowRectEx
GetActiveWindow
GetWindowRect
ShowWindow
CreateAcceleratorTableA
PeekMessageA
MsgWaitForMultipleObjects
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
SetCursorPos
LoadImageA
SetCursor
MapWindowPoints
MoveWindow
SystemParametersInfoA
GetKeyState
GetCursorPos
GetClientRect
FillRect
EnumChildWindows
DefFrameProcA
SetFocus
GetFocus
IsChild
GetClassNameA
DestroyIcon
gdi32
GetStockObject
SetBkColor
SetTextColor
CreateSolidBrush
DeleteObject
GetObjectType
GetObjectA
CreateCompatibleDC
GetDIBits
DeleteDC
CreateDIBSection
SelectObject
BitBlt
CreateBitmap
SetPixel
ole32
CoInitialize
RevokeDragDrop
Sections
.code Size: 1024B - Virtual size: 658B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 438B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 700B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ