Static task
static1
Behavioral task
behavioral1
Sample
373230ee92d2a31bcbaaee5e07dedbef_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
373230ee92d2a31bcbaaee5e07dedbef_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
373230ee92d2a31bcbaaee5e07dedbef_JaffaCakes118
-
Size
36KB
-
MD5
373230ee92d2a31bcbaaee5e07dedbef
-
SHA1
8f4d944dfe28087edd9fbe6200d7522a0e8eeddb
-
SHA256
166ae9d0b5a6ab1601aba3244fdb44b825a89520428e1ebcb3b995c73e03cf7f
-
SHA512
9ed6bf662a0c586c5b4826c20b22881b1ea4164f10fcc3791012ed5d258fb4b0936e492f6e6b103916b78dd8b77d13f70133bda978a9338688612126d3d5a99a
-
SSDEEP
384:lJwpKffXfodMQFJ3PuV65aihdmlWLaqVy1SosrBH:llXf+dPW2aihUW+fgoO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 373230ee92d2a31bcbaaee5e07dedbef_JaffaCakes118
Files
-
373230ee92d2a31bcbaaee5e07dedbef_JaffaCakes118.exe windows:1 windows x86 arch:x86
fb77b7a0d209cf836640054dcaea3abd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
user32
GetCapture
EndPaint
GetClientRect
GetClassInfoExA
EnumThreadWindows
GetDlgItem
RedrawWindow
GetDC
SendMessageA
GetClassNameA
FillRect
InsertMenuItemA
GetSysColorBrush
GetFocus
DrawEdge
SetWindowLongA
SetWindowTextA
ShowWindow
SetDlgItemTextA
SetCapture
SendDlgItemMessageA
RegisterClassExA
GetDlgCtrlID
MessageBoxA
IsWindowEnabled
IsDialogMessageA
GetWindowLongA
GetSystemMenu
GetSysColor
GetMessageA
DrawStateA
DrawIconEx
DrawTextA
DrawFocusRect
TranslateMessage
DispatchMessageA
SystemParametersInfoA
BeginPaint
CallWindowProcA
CheckDlgButton
CreateDialogIndirectParamA
CreateDialogParamA
DefWindowProcA
DialogBoxParamA
ReleaseDC
ReleaseCapture
LoadIconA
GetWindowTextA
EnableMenuItem
PostQuitMessage
LoadCursorA
EnableWindow
EndDialog
gdi32
SetBkMode
SetBkColor
SelectObject
CreateSolidBrush
CreateDIBitmap
CreateFontIndirectA
DeleteObject
SetTextColor
kernel32
UnmapViewOfFile
TerminateProcess
GetTempPathA
SuspendThread
Sleep
GetTempFileNameA
ExitProcess
SetLastError
SetFilePointer
GetModuleHandleA
DeleteFileA
CloseHandle
SetFileAttributesA
GetModuleFileNameA
ResumeThread
CreateFileA
ReadProcessMemory
MapViewOfFile
GetLastError
LocalFree
GlobalFree
GetFileSize
CreateProcessA
lstrlen
GlobalAlloc
lstrcpy
lstrcat
GetWindowsDirectoryA
GetCommandLineA
WriteProcessMemory
WriteFile
GetTickCount
WaitForSingleObject
VirtualProtectEx
GetThreadContext
FormatMessageA
CreateFileMappingA
CopyFileA
shell32
ShellExecuteA
DragQueryFileA
DragFinish
DragAcceptFiles
comdlg32
GetOpenFileNameA
Sections
CODE Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.crk Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE