Static task
static1
Behavioral task
behavioral1
Sample
677e9ab97db7c24adfb4cfcbd9d08b9c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
677e9ab97db7c24adfb4cfcbd9d08b9c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
677e9ab97db7c24adfb4cfcbd9d08b9c_JaffaCakes118
-
Size
290KB
-
MD5
677e9ab97db7c24adfb4cfcbd9d08b9c
-
SHA1
559a533a3e6cec3d4730476b28e1e75010394009
-
SHA256
d490de05314255cb970a526326d25956ec0448b507ee770f825a5778dab48a20
-
SHA512
9173aecfadc52f47a648295744099fd791c62e2056b1328df9d127381250d13cdfcde023f6ac8bdbed59c9cb6260b0ebc104c4a74db362911bb6d771010e8f04
-
SSDEEP
6144:8VSEn9toc0w3z62HMaDVGgcaPYJYRHKYttOjt+yYrHDqkdvT1Uh:2SEn9toc0J9aD00QUqcOjtYTGkdb1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 677e9ab97db7c24adfb4cfcbd9d08b9c_JaffaCakes118
Files
-
677e9ab97db7c24adfb4cfcbd9d08b9c_JaffaCakes118.exe windows:5 windows x86 arch:x86
4bda55d6696e03a404d3b9de474847bd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetFocus
GetCursor
IsIconic
SetScrollInfo
CreateWindowExW
ValidateRgn
RemoveMenu
WinHelpA
GetSysColor
TranslateMessage
MapWindowPoints
GetScrollRange
DispatchMessageW
DefWindowProcW
SetParent
GetClassInfoExA
ChangeClipboardChain
WaitMessage
DestroyMenu
CreateWindowExA
GetForegroundWindow
GetWindowRect
RegisterWindowMessageA
SetWindowTextW
DrawFocusRect
IsChild
GetKeyboardLayoutList
DefWindowProcA
IsWindow
ScrollDC
GetDC
ShowCaret
GetNextDlgTabItem
RegisterClassW
ShowCursor
SetWindowLongA
esenkcsp
_Getcoll
_FExp
_Stof
_FDtest
_FDscale
_Toupper
_Inf
_FSnan
gdi32
PlayEnhMetaFileRecord
SetTextColor
RoundRect
GetTextAlign
CreateSolidBrush
Polyline
SetDIBColorTable
GdiFlush
GetBkColor
DeleteObject
GetClipRgn
SetRectRgn
DeleteMetaFile
PatBlt
CreateRectRgnIndirect
GetBitmapBits
GetNearestColor
kernel32
GetDriveTypeA
LocalAlloc
lstrcmpW
GetStartupInfoA
FreeEnvironmentStringsA
IsValidCodePage
FormatMessageA
GetCommandLineW
SetEvent
SetThreadPriority
UnhandledExceptionFilter
OutputDebugStringA
SetStdHandle
TlsAlloc
GetFileAttributesA
GlobalUnlock
VirtualFree
ExitProcess
GlobalAlloc
GetStdHandle
MultiByteToWideChar
GetStartupInfoW
lstrcatA
SetUnhandledExceptionFilter
DeleteCriticalSection
GlobalAddAtomA
SetPriorityClass
IsDBCSLeadByteEx
lstrlenW
GlobalAlloc
InterlockedDecrement
InitializeCriticalSection
GetTempPathA
Sleep
ntdll
ZwSetEvent
NtSetSystemInformation
NtQueryInformationFile
NtQuerySystemTime
NtCreateMutant
RtlCancelTimer
ZwProtectVirtualMemory
RtlExitUserThread
ole32
OleIsCurrentClipboard
StgCreateDocfile
OleQueryLinkFromData
CreateBindCtx
CoIsOle1Class
StgCreateDocfileOnILockBytes
CoGetMalloc
OleIsRunning
CoTaskMemFree
WriteClassStg
OleRun
OleCreateLink
CreateOleAdviseHolder
OleRegEnumFormatEtc
StringFromCLSID
OleGetIconOfFile
Sections
.text Size: 201KB - Virtual size: 201KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ