Static task
static1
Behavioral task
behavioral1
Sample
310b775d57aa8eed72c5129218043616_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
310b775d57aa8eed72c5129218043616_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
310b775d57aa8eed72c5129218043616_JaffaCakes118
-
Size
487KB
-
MD5
310b775d57aa8eed72c5129218043616
-
SHA1
2fd6606139c102fb4c878dcc498ce6df8ef8fc86
-
SHA256
9ad14208e0c8cfe96704df4c5fc75cd90815107f83a46347f3a2f6f75963253a
-
SHA512
b7c3d60c4ef2850f997ec2fbc9b31c7899dc4be47f79506427bca728155d562a86a35670850c79b4a559c7a01bddb22946c18ec8a9108a3c4d9b00b18fc110e5
-
SSDEEP
12288:Qd4WcUOcNK24Yh/JlgHF9O1NQNVPVglee6tHgKu91hV:0tcUIBKgFSWNVPVGee6NgKu1V
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 310b775d57aa8eed72c5129218043616_JaffaCakes118
Files
-
310b775d57aa8eed72c5129218043616_JaffaCakes118.exe windows:5 windows x86 arch:x86
e7d126a3350060f5df0296f0830f3d7a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharLowerBuffA
GetDlgItemTextW
OpenWindowStationA
GetWindowLongW
MsgWaitForMultipleObjects
SendMessageW
GetClipboardData
GetMessageW
SetProcessWindowStation
GetCursorPos
GetClassNameW
GetIconInfo
GetKeyState
LoadCursorW
GetWindowThreadProcessId
EndDialog
ToUnicode
GetWindowTextW
DispatchMessageW
PeekMessageA
GetKeyboardState
SetThreadDesktop
CloseWindowStation
GetDlgItemTextA
PeekMessageW
ExitWindowsEx
FindWindowExW
OpenDesktopA
GetDlgItem
GetForegroundWindow
DrawIcon
GetMessageA
CloseDesktop
kernel32
SystemTimeToFileTime
CreateFileMappingW
LeaveCriticalSection
WriteFile
lstrlenW
lstrcpyA
CreateFileW
FindNextFileW
CloseHandle
GetTempPathW
GetComputerNameW
WideCharToMultiByte
GetSystemTimeAsFileTime
HeapReAlloc
FindResourceW
HeapAlloc
OpenProcess
GetModuleHandleA
GetDriveTypeW
ReadFile
GetTempFileNameW
IsBadReadPtr
lstrcmpiA
GetCurrentThreadId
SetFileAttributesW
SetFilePointer
FindClose
ResetEvent
ReleaseMutex
GetModuleFileNameA
UnmapViewOfFile
WriteProcessMemory
GetLocalTime
InitializeCriticalSection
EnterCriticalSection
CreateThread
GetProcessHeap
MapViewOfFile
CreateEventW
GetFileSizeEx
SetEvent
FindFirstFileW
lstrcatA
MultiByteToWideChar
GetThreadPriority
OpenMutexW
GetModuleFileNameW
lstrcpyW
lstrcmpiW
CreateMutexW
SetFileTime
GetExitCodeProcess
FlushFileBuffers
GetProcessTimes
GetFileTime
GlobalLock
GetCommandLineA
lstrcpynW
Sections
.bkjyr Size: 39KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.qded Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mbkpez Size: 7KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ