Static task
static1
Behavioral task
behavioral1
Sample
47331835788ae65a5a547f4555fdbe42_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
47331835788ae65a5a547f4555fdbe42_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
47331835788ae65a5a547f4555fdbe42_JaffaCakes118
-
Size
49KB
-
MD5
47331835788ae65a5a547f4555fdbe42
-
SHA1
5f9756856988609bc30eae41e4bc506e28ebe33b
-
SHA256
547e5cb9abb850e6119c4875b7801a87f4cc2e1cfeedaa7668e5b2ebf771745c
-
SHA512
da0300b319eafbf94940b52e32079bd620d97a2974aca10c680c803a5912a1fe2e572648edfada00dace4daef48803739b0991654c9e3d9ebd75c172316ed36e
-
SSDEEP
768:h+XvZr/D2putORvqryB2KtSSJB/wJzIjv1q15dEMn45JwfIe32y:012aydJJ8qQnSGl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 47331835788ae65a5a547f4555fdbe42_JaffaCakes118
Files
-
47331835788ae65a5a547f4555fdbe42_JaffaCakes118.exe windows:5 windows x86 arch:x86
8fb356fb623d27ae6814401905a453ed
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetClassNameW
PeekMessageW
GetIconInfo
LoadCursorW
GetCursorPos
CloseDesktop
EndDialog
OpenDesktopA
FindWindowExW
DrawIcon
GetClipboardData
GetDlgItem
CloseWindowStation
PeekMessageA
GetDlgItemTextA
ToUnicode
GetKeyState
GetMessageA
ExitWindowsEx
GetForegroundWindow
SendMessageW
MsgWaitForMultipleObjects
CharLowerBuffA
GetWindowTextW
OpenWindowStationA
SetThreadDesktop
GetWindowThreadProcessId
GetWindowLongW
SetProcessWindowStation
GetKeyboardState
DispatchMessageW
GetMessageW
GetDlgItemTextW
kernel32
GetLastError
FindNextFileW
lstrcatA
DisconnectNamedPipe
GetFileSizeEx
GetExitCodeProcess
SystemTimeToFileTime
GetTempFileNameW
FindResourceW
EnterCriticalSection
CreateDirectoryW
HeapFree
GetModuleFileNameA
GetLogicalDrives
UnmapViewOfFile
GetLocalTime
ReleaseMutex
GetDriveTypeW
CloseHandle
lstrcatW
WaitForSingleObject
MoveFileExW
InitializeCriticalSection
Sleep
GetProcessTimes
MultiByteToWideChar
GlobalUnlock
GlobalLock
GetCurrentProcessId
SetLastError
MapViewOfFile
WriteProcessMemory
OpenProcess
ExpandEnvironmentStringsW
GetFileTime
lstrcpyW
CreateEventW
GetThreadPriority
GetModuleHandleA
SetThreadPriority
GetVersionExW
lstrcmpiA
lstrcpyA
CreateMutexW
SetFileAttributesW
HeapAlloc
FlushFileBuffers
WriteFile
CopyFileW
HeapReAlloc
ResetEvent
GetComputerNameW
IsBadReadPtr
GetTimeZoneInformation
DeleteFileW
SetEndOfFile
WideCharToMultiByte
Sections
.vsb Size: 39KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fun Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xqzgv Size: 7KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ