Static task
static1
Behavioral task
behavioral1
Sample
44cc8c40a01bb6ce831462edefd8c40a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
44cc8c40a01bb6ce831462edefd8c40a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
44cc8c40a01bb6ce831462edefd8c40a_JaffaCakes118
-
Size
175KB
-
MD5
44cc8c40a01bb6ce831462edefd8c40a
-
SHA1
a7dd4211024b8ca690389e4d49d32a0edd241e24
-
SHA256
14dcb357fe7dc60e82ee9186b6649c67b90faa57293ec60a5cb585d9da984c11
-
SHA512
4a5259876135aff2d6ffecdffedcd0a8fd9a90a28d1ffa48a80a2270880e815699100cc00f78c31d7492be36f6eb37b430cd1b06e5424dc1df8eef9f96187b0a
-
SSDEEP
3072:J8/LKoYns+9Kw1crS1jFYiWA7FhvckNkxh:i/LKoCsUKw1pjFY4rNk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44cc8c40a01bb6ce831462edefd8c40a_JaffaCakes118
Files
-
44cc8c40a01bb6ce831462edefd8c40a_JaffaCakes118.exe windows:5 windows x86 arch:x86
b09f7200444afcbd56ef5210182739ee
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowPos
SetWindowTextA
SetWindowTextW
ShowWindow
ShowWindowAsync
SetParent
SetFocus
SetDlgItemTextA
SetDlgItemInt
SendNotifyMessageA
SendMessageW
SendMessageA
SendDlgItemMessageA
RegisterWindowMessageA
PostMessageA
MoveWindow
MessageBoxW
LoadIconA
KillTimer
IsWindowVisible
IsWindow
SetWindowLongA
GetWindowThreadProcessId
GetWindowTextA
GetWindowRect
GetParent
GetForegroundWindow
GetDlgItemTextA
GetDlgItemInt
GetDlgItem
GetDesktopWindow
GetCursorPos
GetClientRect
FlashWindow
FindWindowExA
FindWindowA
ExitWindowsEx
EndDialog
EnableWindow
DialogBoxParamW
DestroyWindow
CreateDialogParamW
CheckDlgButton
CallWindowProcA
IsDlgButtonChecked
SetTimer
wsprintfA
kernel32
CreateEventA
WriteFile
TryEnterCriticalSection
SetPriorityClass
ReadFile
OpenProcess
LeaveCriticalSection
InitializeCriticalSection
GlobalFree
GlobalAlloc
GetVersionExA
GetTickCount
GetProcAddress
GetPrivateProfileStringA
GetPrivateProfileIntA
GetModuleHandleA
GetModuleFileNameA
GetLocalTime
GetFileSize
ExitProcess
EnterCriticalSection
DeleteCriticalSection
CreateThread
CreateMutexA
CreateFileA
GetSystemTimeAsFileTime
CreateDirectoryA
CloseHandle
comctl32
ord17
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
Shell_NotifyIconA
hooktlg
GetHookVersion
UnHook
Hook
ntdll
NtReadVirtualMemory
NtDelayExecution
NtSetEvent
NtWaitForSingleObject
winmm
PlaySoundA
Sections
.text Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ