Static task
static1
Behavioral task
behavioral1
Sample
401dd221ce998daacd5f700b6bf6dabb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
401dd221ce998daacd5f700b6bf6dabb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
401dd221ce998daacd5f700b6bf6dabb_JaffaCakes118
-
Size
20KB
-
MD5
401dd221ce998daacd5f700b6bf6dabb
-
SHA1
e97491edb445dff7aa0467a4eca85923b067762c
-
SHA256
0e0ee29a51f8f2769ccdb3d3ef5916531d9504ddd605e2c415a525ba46b75424
-
SHA512
db7466076ade72b7f1d57d341d44fa28166364cf871c9fcad9c948a0d8c98ee7d74bb36ca2608ac86b1d59c06d45f41de16db3373408e1684c1b6840de073baa
-
SSDEEP
192:nuPwDEB3mU3iTzmcjs7TP1oyne6o55zlWnVxRjSJZ:nbDEJmU3iHmQqb1YZlWn0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 401dd221ce998daacd5f700b6bf6dabb_JaffaCakes118
Files
-
401dd221ce998daacd5f700b6bf6dabb_JaffaCakes118.exe windows:4 windows x86 arch:x86
b05e1db5ae89c1563980b0124c5dd1f6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
EnumLanguageGroupLocalesA
EnumUILanguagesW
GetCommandLineA
lstrlenA
GetLastError
Sleep
lstrcatA
GetStartupInfoA
msvcrt
strrchr
memset
??2@YAPAXI@Z
memcpy
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
??3@YAXPAX@Z
user32
GetWindowLongW
LoadCursorW
GetWindowDC
GetSystemMetrics
GetSysColorBrush
LoadStringW
GetSysColor
MessageBeep
GetProcessDefaultLayout
GetMenu
GetFocus
GetDlgItem
GetDlgCtrlID
GetDC
GetCursorPos
GetClipboardData
GetClientRect
GetClassNameW
GetClassInfoW
EndPaint
EndMenu
EndDialog
EnableWindow
EnableMenuItem
DrawTextW
DrawIconEx
DialogBoxParamW
DestroyWindow
DestroyMenu
DefWindowProcW
LoadImageW
DestroyIcon
CreateDialogParamW
CloseClipboard
CheckRadioButton
CheckMenuRadioItem
CheckMenuItem
CheckDlgButton
BeginPaint
UpdateWindow
UnhookWindowsHookEx
TranslateMessage
TranslateAcceleratorW
GetDesktopWindow
MoveWindow
OffsetRect
OpenClipboard
PostMessageW
PostQuitMessage
RedrawWindow
RegisterClassExW
RegisterClassW
ReleaseDC
SetCursor
SetWindowRgn
SetWindowsHookExW
SetWindowTextW
ShowWindow
TrackPopupMenuEx
SendMessageA
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
HideCaret
InflateRect
InvalidateRect
IsChild
IsClipboardFormatAvailable
IsDialogMessageW
LoadAcceleratorsW
SetDlgItemInt
SetDlgItemTextW
SetFocus
SetMenu
SetProcessDefaultLayout
SetWindowLongW
SetWindowPos
LoadIconW
LoadMenuW
CreateWindowExW
MapWindowPoints
GetSubMenu
gdi32
PlayEnhMetaFile
CreateFontIndirectW
DeleteObject
DeleteDC
CreateSolidBrush
CreateRoundRectRgn
CreateDIBSection
CreateCompatibleDC
StretchBlt
SetTextColor
SetDIBits
CreateHatchBrush
CreatePen
CreatePolyPolygonRgn
EnumFontsA
EnumICMProfilesA
GdiFlush
GdiSetBatchLimit
GetCurrentPositionEx
GetLogColorSpaceA
GetRgnBox
GetWindowExtEx
CancelDC
CreateDIBitmap
SetStretchBltMode
SetTextAlign
BitBlt
ExcludeClipRect
GetDeviceCaps
GetDIBits
GetStockObject
IntersectClipRect
SelectClipRgn
SelectObject
SetBkColor
SetBkMode
winspool.drv
DeviceCapabilitiesA
Sections
.text Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE