Static task
static1
Behavioral task
behavioral1
Sample
497312bd2b4d8b8a86de1983d2ba59f4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
497312bd2b4d8b8a86de1983d2ba59f4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
497312bd2b4d8b8a86de1983d2ba59f4_JaffaCakes118
-
Size
42KB
-
MD5
497312bd2b4d8b8a86de1983d2ba59f4
-
SHA1
609d9bc09dc82cb86b8ec373f9d00ac847de3cd7
-
SHA256
77777ea4d154635e1726a018d2a7d2196c01eda806f9a95240d8f2ba51818a0d
-
SHA512
a9a775010578ba3fa06df3c99efea4f0bacc08afb04d937c076978bb0096a13a765ba17cf1e6f65763336919b236171cd96db3f38d028ee41c2210d426c67d9d
-
SSDEEP
768:ho0crdfHaJBqSogRh+fz+D9PPfCJ+VXTbQveZiHoKboKYif:ho1F6rCgS+5aJ+Wve0oKboKD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 497312bd2b4d8b8a86de1983d2ba59f4_JaffaCakes118
Files
-
497312bd2b4d8b8a86de1983d2ba59f4_JaffaCakes118.exe windows:4 windows x86 arch:x86
7d0d7674d267630ab630a5e5546d1e38
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadResource
BackupWrite
IsBadHugeWritePtr
IsProcessorFeaturePresent
PrepareTape
CreateNamedPipeW
VirtualProtect
_hread
CloseHandle
DisableThreadLibraryCalls
HeapAlloc
LockFile
GetThreadContext
Heap32ListNext
ReleaseMutex
SetErrorMode
GetBinaryTypeW
ReadConsoleOutputW
CreateEventA
GetEnvironmentStringsA
SetFilePointer
CreateFiber
GetEnvironmentStrings
GetConsoleAliasExesLengthW
CopyFileExA
GetLastError
BuildCommDCBW
IsValidLocale
SetCommState
Process32FirstW
CreateFileMappingW
user32
GetMenuInfo
CreateDesktopA
UpdatePerUserSystemParameters
CharLowerBuffA
IsChild
CheckDlgButton
EnumWindowStationsW
AppendMenuW
DefMDIChildProcA
CallMsgFilterA
RealGetWindowClassW
DialogBoxIndirectParamW
FindWindowExW
GetCursorFrameInfo
DdeInitializeA
CallMsgFilterW
IsWindow
GetForegroundWindow
GetSysColorBrush
IsWindowVisible
DdeCreateDataHandle
MessageBoxIndirectW
GetMenuStringW
ChildWindowFromPointEx
IsCharAlphaA
UnloadKeyboardLayout
EnumWindows
WaitForInputIdle
GetMenuDefaultItem
CharToOemA
CreateMenu
PtInRect
SetWindowStationUser
GetCaretBlinkTime
WinHelpW
GetClassInfoExA
DestroyCursor
SetForegroundWindow
MessageBeep
DeleteMenu
SetDlgItemTextA
DefFrameProcW
GetMenuBarInfo
EmptyClipboard
CharNextW
IsHungAppWindow
SetMessageExtraInfo
SetPropW
SetWindowPos
ScrollChildren
gdi32
GetCharABCWidthsW
SetPixel
AddFontResourceTracking
ResizePalette
GdiConsoleTextOut
GetMetaFileA
GetBitmapDimensionEx
GetETM
CreateBrushIndirect
GetCharWidthI
GdiEntry16
CreatePen
EnumEnhMetaFile
GetWorldTransform
SetVirtualResolution
GdiConvertPalette
GetRelAbs
CLIPOBJ_ppoGetPath
GdiCreateLocalEnhMetaFile
EngCheckAbort
CreateDCW
GetRandomRgn
TextOutW
bMakePathNameW
NamedEscape
EnableEUDC
FontIsLinked
SetRelAbs
DeleteObject
GetFontData
EngQueryEMFInfo
CreateFontIndirectExA
GetCharWidthA
SetEnhMetaFileBits
GetTextExtentPoint32W
EngCreateDeviceSurface
GdiPlayDCScript
EngCreateBitmap
GetNearestPaletteIndex
FONTOBJ_cGetGlyphs
EnumFontsW
XFORMOBJ_iGetXform
ArcTo
GdiIsMetaFileDC
SetTextJustification
StretchBlt
GdiEntry10
EnumMetaFile
SetMapMode
PolyDraw
comdlg32
ChooseFontA
PageSetupDlgA
PrintDlgExW
ReplaceTextA
PrintDlgA
dwLBSubclass
GetOpenFileNameW
GetSaveFileNameW
CommDlgExtendedError
psapi
GetDeviceDriverBaseNameW
GetProcessMemoryInfo
QueryWorkingSet
GetDeviceDriverFileNameW
EnumDeviceDrivers
GetDeviceDriverFileNameA
InitializeProcessForWsWatch
GetModuleFileNameExA
GetDeviceDriverBaseNameA
GetMappedFileNameA
EmptyWorkingSet
EnumProcessModules
GetModuleInformation
GetWsChanges
comctl32
ImageList_DrawIndirect
FlatSB_SetScrollInfo
ImageList_BeginDrag
UninitializeFlatSB
ImageList_SetImageCount
FlatSB_GetScrollInfo
ImageList_Write
DrawStatusTextW
FlatSB_SetScrollProp
ImageList_GetImageRect
CreateMappedBitmap
CreatePropertySheetPageA
ImageList_SetFlags
ImageList_DragEnter
GetMUILanguage
Sections
.text Size: 4KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE