Static task
static1
Behavioral task
behavioral1
Sample
3133fae6b96e4a46d8e80c4d8396611f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3133fae6b96e4a46d8e80c4d8396611f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3133fae6b96e4a46d8e80c4d8396611f_JaffaCakes118
-
Size
128KB
-
MD5
3133fae6b96e4a46d8e80c4d8396611f
-
SHA1
4ac3b9f48ee7ba85bcc72852a74ef4d9daca51f3
-
SHA256
a10e1b9c882d016005b87e580fb657dca6a6011516d87fb7a7a6d4908a09b70d
-
SHA512
a30bbb223d65483ef0197803b5db1f3b1b77ef465cfdba828fb69fa7ff57e95a46224dc45a0c88d9b6ac1ecd1b9074c89cff07970a4fe4704f7bd2563a130fe4
-
SSDEEP
3072:bDLM9TGRh4QaGbquMOdkewLGlQNnYuZo:bDY96RhNbMOdkeNQ+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3133fae6b96e4a46d8e80c4d8396611f_JaffaCakes118
Files
-
3133fae6b96e4a46d8e80c4d8396611f_JaffaCakes118.exe windows:4 windows x86 arch:x86
ceac82724b610f3305c39633c7e09cce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentDirectoryA
GetCurrentThread
ExpandEnvironmentStringsW
InvalidateConsoleDIBits
ExitVDM
GetBinaryTypeA
GetThreadLocale
SetupComm
GetConsoleAliasA
SearchPathA
ExitProcess
ReadConsoleOutputW
GetModuleFileNameW
lstrcpy
TransmitCommChar
_lcreat
GetDateFormatW
GetCPInfo
VirtualAlloc
GetCurrentThread
EndUpdateResourceW
IsBadReadPtr
OpenEventW
BuildCommDCBA
user32
DdeSetQualityOfService
DialogBoxParamW
GetUserObjectInformationA
SetPropA
IsChild
SetLastErrorEx
DdeUninitialize
VkKeyScanW
wvsprintfA
GetClassInfoA
SetSystemMenu
CloseClipboard
DeregisterShellHookWindow
GetIconInfo
OemToCharW
DdeGetLastError
GetClassWord
DrawMenuBarTemp
SetWindowsHookA
TileChildWindows
GetMenuItemRect
GetDCEx
SetCursorContents
CreateAcceleratorTableW
DrawTextExW
SetWindowLongW
GetAppCompatFlags
GetUserObjectSecurity
DragDetect
EnumPropsExW
OpenDesktopA
DrawTextExA
ChildWindowFromPoint
EnumDisplayDevicesW
SetDlgItemTextW
ClipCursor
InsertMenuA
GetClipCursor
DrawCaptionTempW
gdi32
GdiConsoleTextOut
EnumMetaFile
GdiDeleteLocalDC
SelectClipPath
PolyDraw
SetRelAbs
StrokePath
SetTextAlign
GetCharWidthFloatW
GdiEntry8
GetTextCharacterExtra
PolyTextOutA
GetEnhMetaFileDescriptionA
GdiGetSpoolMessage
SetPixel
AngleArc
GetColorSpace
GdiProcessSetup
SaveDC
GetCharWidthFloatA
DeviceCapabilitiesExA
RemoveFontResourceA
CreateColorSpaceA
EnumICMProfilesA
SelectClipRgn
SetPaletteEntries
GdiConvertPalette
SetWinMetaFileBits
GdiFixUpHandle
RoundRect
GetRegionData
SetBkMode
GetPixel
ole32
CoAddRefServerProcess
HBRUSH_UserMarshal
OleGetIconOfClass
CoGetCallerTID
CoLoadLibrary
CoGetCallContext
OleCreateStaticFromData
OleTranslateAccelerator
HGLOBAL_UserSize
CoGetMarshalSizeMax
HMETAFILEPICT_UserSize
CoGetStandardMarshal
CLIPFORMAT_UserFree
CoGetTreatAsClass
CoRegisterMessageFilter
OleConvertIStorageToOLESTREAM
CoFreeAllLibraries
OleCreateEx
OleRun
HBITMAP_UserFree
SetErrorInfo
CoQueryClientBlanket
CreateBindCtx
OleGetAutoConvert
OleLockRunning
HPALETTE_UserFree
StgOpenStorageOnILockBytes
OleRegEnumFormatEtc
StgIsStorageILockBytes
OleIsRunning
oleaut32
VarBoolFromDisp
VarR8FromR4
OACreateTypeLib2
VarI2FromR4
VarDateFromDisp
VarDateFromR8
DosDateTimeToVariantTime
VARIANT_UserMarshal
DllCanUnloadNow
VarR8FromDisp
LPSAFEARRAY_UserSize
VarDateFromUI4
VarUI2FromStr
VarR8FromBool
SysAllocStringLen
VarR8FromDate
VarBoolFromR4
SysReAllocString
VarDecFromBool
VarDateFromUI2
SafeArrayRedim
VarBstrFromUI2
SafeArrayUnlock
VarI2FromDate
VarBoolFromDate
VarUI4FromI4
BSTR_UserUnmarshal
VarI1FromR4
VarR8FromDec
VarR8FromUI1
CreateTypeLib
SafeArrayLock
SafeArrayPtrOfIndex
VarUI4FromDec
VarDecFromI2
VarI1FromUI1
VarCyFromUI4
Sections
.data Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 39KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 56KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 21KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ