Static task
static1
Behavioral task
behavioral1
Sample
5f33379f4d3a1d692cc434541cf0526f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5f33379f4d3a1d692cc434541cf0526f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5f33379f4d3a1d692cc434541cf0526f_JaffaCakes118
-
Size
59KB
-
MD5
5f33379f4d3a1d692cc434541cf0526f
-
SHA1
3ae6b3a847bf24893253c4fec25ab0a0f8f2bc48
-
SHA256
9e1d46857caa285096ed57963451dd5d47b4ef51f592ab866139571efe9c0b71
-
SHA512
c50b06913903a7f94d49287793e41e88c83f8b8f6db1316edf7b6d1de2bcc7c0cd98a62559ee6ab049182a965c8a648e8afb53ff79d1a9d333048a29289b6063
-
SSDEEP
768:dv2tEtoa0mHRxmydeg8yiRMXSfbEAGkuPomK56GpUFtfF64/wVL1e8BZhp:gna0e3mxHMXSzEkuP8Exrz07
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5f33379f4d3a1d692cc434541cf0526f_JaffaCakes118
Files
-
5f33379f4d3a1d692cc434541cf0526f_JaffaCakes118.exe windows:4 windows x86 arch:x86
93c497ba6f23ae5dbbf11bef866443d7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateRectRgn
StartPage
DeleteDC
LineTo
GetTextMetricsA
SelectObject
CreateFontIndirectA
GetDeviceCaps
DeleteObject
SaveDC
Polyline
SetTextColor
CreateCompatibleDC
Ellipse
GetBkColor
CreatePen
BitBlt
SetBkColor
CreateSolidBrush
SetBkMode
RestoreDC
RectInRegion
EndDoc
user32
SetClipboardData
InsertMenuA
UnionRect
OpenClipboard
InflateRect
RegisterClassExA
SetClassLongA
GetCapture
SendMessageA
ModifyMenuA
TrackPopupMenuEx
AppendMenuA
ReleaseDC
LoadBitmapA
GetClientRect
CreateIconIndirect
IsDialogMessageA
EnableMenuItem
CreateMenu
CheckDlgButton
CloseClipboard
LoadIconA
CreatePopupMenu
UpdateWindow
ChildWindowFromPoint
EnumChildWindows
GetDlgItem
GetCursorPos
SetWindowPos
PtInRect
GetSysColor
MapWindowPoints
kernel32
ExitProcess
TlsFree
FreeEnvironmentStringsA
CreateEventA
DuplicateHandle
CompareStringW
GetStringTypeA
ReadFile
lstrlenW
WaitForMultipleObjects
LoadLibraryA
GetUserDefaultLCID
RtlUnwind
GetPriorityClass
HeapFree
GetDriveTypeA
IsValidLocale
GetThreadContext
GlobalUnlock
lstrcpyA
GetOEMCP
RaiseException
EnterCriticalSection
lstrcatA
CompareStringA
ole32
OleRun
OleDraw
OleRegEnumVerbs
CoMarshalHresult
OleUninitialize
CoGetMarshalSizeMax
OleNoteObjectVisible
CoInstall
CoFreeAllLibraries
OleCreateLink
OleGetClipboard
OleGetIconOfClass
OleIsRunning
CoTreatAsClass
CoTaskMemRealloc
OleCreateLinkFromData
CoFreeLibrary
advapi32
LookupPrivilegeValueA
GetKernelObjectSecurity
RegEnumValueA
RegConnectRegistryA
GetSidSubAuthority
SetTokenInformation
AllocateAndInitializeSid
OpenProcessToken
RegSetValueExA
RegCreateKeyExA
GetAce
ControlService
SetSecurityInfo
RegDeleteKeyA
SetKernelObjectSecurity
OpenSCManagerA
StartServiceA
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 926B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 944B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ