Static task
static1
Behavioral task
behavioral1
Sample
353ef11c5cefa1d129ff65a47852717d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
353ef11c5cefa1d129ff65a47852717d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
353ef11c5cefa1d129ff65a47852717d_JaffaCakes118
-
Size
144KB
-
MD5
353ef11c5cefa1d129ff65a47852717d
-
SHA1
7a5b93d2b8530c207f3cc6a425b180d039af39e2
-
SHA256
e44f534b8e6a65d4d3db460b0e2b4d9a1e164141133332d3c0332860743a57a8
-
SHA512
430dbe653a9be68d070c1f9f3cc37ee89adae4c62cbe3894b35b8d7d12bca31dacb0d229125419992dcdc5baabc67b44e63342bee98008aacc30ba908206c8e3
-
SSDEEP
3072:lo0ZWSDz60L4aPCaugoZkBZ6URTvTb3hNljRuB3:usWSDz6080Ca8uXRT33hz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 353ef11c5cefa1d129ff65a47852717d_JaffaCakes118
Files
-
353ef11c5cefa1d129ff65a47852717d_JaffaCakes118.exe windows:5 windows x86 arch:x86
cb1ea9f196c046ac08ced67752625b3c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kbdtymgr
_Dscale
_Dtest
_FXbig
_LCosh
_FDtest
_Dnorm
_Xbig
_Denorm
comdlg32
GetOpenFileNameA
user32
GetCaretPos
ToAscii
ActivateKeyboardLayout
GetClipboardData
IsClipboardFormatAvailable
DefWindowProcW
ShowCursor
RegisterClassA
KillTimer
IsIconic
IsWindow
UnregisterClassW
SetPropA
GetMenuStringW
CallWindowProcA
GetWindowTextW
GetWindowPlacement
SetWindowsHookExW
EnumThreadWindows
ReleaseDC
UnhookWindowsHookEx
IsCharAlphaNumericA
GetWindowTextLengthW
WaitMessage
EqualRect
DrawIcon
SetWindowPos
GetSysColorBrush
SendMessageW
SubtractRect
ShowScrollBar
GetCursorPos
GetMenuItemInfoW
HideCaret
DrawFrameControl
GetClassNameW
SetTimer
LockWindowUpdate
GetComboBoxInfo
DefMDIChildProcA
MapVirtualKeyW
RemoveMenu
CreateIconIndirect
IsDialogMessageA
CloseClipboard
RegisterClassW
gdi32
GetBkColor
GetSystemPaletteEntries
GetBrushOrgEx
GetEnhMetaFilePaletteEntries
GetClipBox
SetAbortProc
CreateBitmap
ExtCreateRegion
GetFontLanguageInfo
GetRandomRgn
CopyEnhMetaFileA
GetTextColor
GetTextExtentPoint32A
CreatePalette
ExcludeClipRect
SetTextColor
CreateBrushIndirect
EndDoc
kernel32
GetFileType
GetTempFileNameA
Sleep
TryEnterCriticalSection
OpenMutexA
TerminateProcess
MapViewOfFileEx
LockResource
VirtualQueryEx
GetLastError
MapViewOfFile
SetEndOfFile
lstrcpyA
GetVersionExA
SetThreadAffinityMask
GetFileAttributesW
GetComputerNameA
ExitThread
GetCommandLineW
GetCurrentProcessId
LeaveCriticalSection
CloseHandle
LoadLibraryExA
EnumCalendarInfoA
CreateFileMappingA
IsValidCodePage
GetSystemTime
SetErrorMode
GetModuleFileNameW
WaitForMultipleObjects
GetCurrentThreadId
GlobalAlloc
GetModuleHandleA
GetModuleFileNameA
lstrlenW
SetEvent
ExitProcess
GetWindowsDirectoryA
RaiseException
UnmapViewOfFile
comctl32
ImageList_GetDragImage
ImageList_GetBkColor
ImageList_Draw
ImageList_Create
ImageList_GetIconSize
shell32
DragAcceptFiles
SHGetMalloc
wininet
InternetQueryOptionA
InternetGoOnline
InternetGetLastResponseInfoA
advapi32
SetSecurityDescriptorDacl
RegFlushKey
ole32
CreateDataAdviseHolder
OleInitialize
CoTaskMemAlloc
CoGetClassObject
CoCreateInstance
IsAccelerator
oleaut32
SafeArrayCreateVector
SysAllocStringLen
SetErrorInfo
imm32
ImmSetCompositionFontA
urlmon
CoInternetCreateZoneManager
Sections
.text Size: 115KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ