Static task
static1
Behavioral task
behavioral1
Sample
639f8c252eb529fa822b3559339dcd4a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
639f8c252eb529fa822b3559339dcd4a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
639f8c252eb529fa822b3559339dcd4a_JaffaCakes118
-
Size
110KB
-
MD5
639f8c252eb529fa822b3559339dcd4a
-
SHA1
6ba6de9959c94646f351d42e3706ab4fc22e70b0
-
SHA256
a8f70421be0d2f6d1ed215f983c0b5080cb6718ee92ff7e76d6411bf1c4032bb
-
SHA512
b447810cf0ad51a647b2f62de0600d699faeeb91d8a3abc47f46d45d3968fb7ffb4d01f36bfca04c396455ebd93a4751f6e0bdfe5c4878036fb1a9b38fc6fe08
-
SSDEEP
3072:qTLituRA0m03jPhpwPK8SyZm6WF/ZR/9YB0U:10FP7mBSl6eR/9Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 639f8c252eb529fa822b3559339dcd4a_JaffaCakes118
Files
-
639f8c252eb529fa822b3559339dcd4a_JaffaCakes118.exe windows:4 windows x86 arch:x86
892cc62a9cd22e645e3eb804a60ab5e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
SafeArrayCreate
SafeArrayGetUBound
RegisterTypeLib
SafeArrayUnaccessData
OleLoadPicture
VariantChangeType
user32
GetWindowThreadProcessId
EndPaint
GetCapture
OpenClipboard
CharLowerBuffA
MessageBeep
SetClipboardData
DrawIconEx
ActivateKeyboardLayout
LoadStringA
InsertMenuItemA
DestroyWindow
ChildWindowFromPoint
SetWindowLongW
SetClassLongA
SetScrollRange
GetKeyState
FindWindowA
MsgWaitForMultipleObjects
IsWindowEnabled
GetMenuItemID
DrawMenuBar
GetActiveWindow
GetKeyboardState
GetCursor
WindowFromPoint
IsIconic
SetPropA
GetMenuItemInfoA
GetClipboardData
CloseClipboard
SetTimer
DestroyMenu
GetWindowDC
IsRectEmpty
ScreenToClient
SendMessageA
PtInRect
GetMenu
GetParent
TranslateMDISysAccel
GetTopWindow
CallNextHookEx
UpdateWindow
SetParent
ReleaseDC
RegisterClassA
GetClassLongA
SystemParametersInfoA
GetMenuItemCount
GetDC
GetWindowLongA
GetWindowTextA
GetClassInfoA
DestroyCursor
SetWindowTextA
BeginPaint
IsZoomed
GetClientRect
IsWindowVisible
GetClassNameA
CharLowerA
GetCursorPos
OffsetRect
GetKeyboardLayoutList
AdjustWindowRectEx
GetLastActivePopup
EnumChildWindows
LoadCursorA
SetRect
SetWindowsHookExA
GetKeyboardLayout
DrawTextA
GetSysColorBrush
DrawAnimatedRects
GetPropA
CreatePopupMenu
CharToOemA
GetSysColor
MoveWindow
IsDialogMessageW
DispatchMessageW
DrawEdge
GetWindowPlacement
GetWindowLongW
GetFocus
CharNextA
GetScrollRange
GetDCEx
GetScrollPos
WaitMessage
EnableMenuItem
EmptyClipboard
UnregisterClassA
RegisterWindowMessageA
GetMenuStringA
IsWindow
GetForegroundWindow
MessageBoxA
ole32
WriteClassStm
MkParseDisplayName
CoGetMalloc
CoReleaseMarshalData
CreateBindCtx
CoCreateInstanceEx
CoRegisterClassObject
CoTaskMemFree
CoRevokeClassObject
CoDisconnectObject
version
VerQueryValueA
GetFileVersionInfoA
VerFindFileA
shell32
SHGetFileInfoA
Shell_NotifyIconA
DragQueryFileA
gdi32
GetBitmapBits
SelectPalette
CreateBitmap
SetBkColor
SaveDC
GetPaletteEntries
CreatePalette
BitBlt
GetDIBits
kernel32
SetEvent
ExitProcess
GetModuleHandleA
GetLocalTime
VirtualAllocEx
Sleep
GetFileType
GetLastError
lstrlenA
GetCPInfo
lstrcatA
ExitThread
LockResource
LocalFree
GlobalAlloc
WriteFile
GetProcAddress
Sections
CODE Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE