Static task
static1
Behavioral task
behavioral1
Sample
68988dd2b590c7cb1f484878c81ee29a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
68988dd2b590c7cb1f484878c81ee29a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
68988dd2b590c7cb1f484878c81ee29a_JaffaCakes118
-
Size
171KB
-
MD5
68988dd2b590c7cb1f484878c81ee29a
-
SHA1
a712d2465b033ee3a99e5a56855340d476d5d263
-
SHA256
924ed48043d15f0e19ed81bb9586d1424e89a202fc72495538c5f1134a5eb07f
-
SHA512
5ffeae3e07a470f92577b5bc4a2b730622ea6815d8840d7708029a1bde649f67b58811451ad9b72ff8b5b43490f0c6ab5f52443095fa857094598b9ea76ee9df
-
SSDEEP
3072:45NdZqyTQWtHNBoJNu3h5AQxBxJWQ18SerAlQ7DDY0Z7luvdyYLVScbab:4zQKHMwApQJmAoDDJDsyCl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 68988dd2b590c7cb1f484878c81ee29a_JaffaCakes118
Files
-
68988dd2b590c7cb1f484878c81ee29a_JaffaCakes118.exe windows:4 windows x86 arch:x86
0750697d5988dc73342632ea9f0828f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMenu
GetActiveWindow
TrackPopupMenu
GetWindowTextA
GetCapture
DrawIconEx
FindWindowA
EnumChildWindows
EnableWindow
IsDialogMessageA
GetPropA
GetMenuItemID
RegisterClassA
HideCaret
CreateMenu
FrameRect
DefFrameProcA
SetCursor
GetClassLongA
DispatchMessageA
CreatePopupMenu
EnumThreadWindows
EnableMenuItem
EndDeferWindowPos
GetClassInfoA
GetIconInfo
CharLowerA
CharToOemA
GetForegroundWindow
GetParent
GetDesktopWindow
GetCursor
GetMenuState
GetFocus
CharNextA
CheckMenuItem
SetWindowPos
GetCursorPos
SystemParametersInfoA
GetClientRect
IsChild
GetKeyState
GetClipboardData
IsWindowVisible
GetWindow
EndPaint
BeginDeferWindowPos
CreateIcon
EqualRect
DrawTextA
GetLastActivePopup
GetMenuItemCount
GetMenuStringA
GetMessagePos
GetSysColorBrush
SetWindowTextA
GetMenuItemInfoA
GetDC
GetDCEx
GetKeyNameTextA
GetScrollPos
ClientToScreen
IsWindowEnabled
DefWindowProcA
DrawFrameControl
SetWindowLongA
DispatchMessageW
GetScrollInfo
EnableScrollBar
ShowWindow
EnumWindows
GetDlgItem
DrawMenuBar
CallWindowProcA
DrawEdge
SetTimer
DeferWindowPos
CallNextHookEx
shlwapi
SHDeleteKeyA
SHGetValueA
PathIsContentTypeA
SHEnumValueA
SHQueryValueExA
SHSetValueA
SHQueryInfoKeyA
PathFileExistsA
PathIsDirectoryA
kernel32
GetEnvironmentStrings
GetCurrentThread
CreateEventA
ExitProcess
SetFilePointer
GetCommandLineA
RaiseException
CompareStringA
GetLocalTime
GetCPInfo
ReadFile
GetVersionExA
VirtualFree
GetModuleFileNameA
SetHandleCount
VirtualAllocEx
GlobalAddAtomA
GetStartupInfoA
EnterCriticalSection
GetUserDefaultLCID
LockResource
GetFileType
InitializeCriticalSection
CreateThread
GetVersion
LocalFree
lstrcmpiA
lstrcpynA
GlobalDeleteAtom
GetModuleHandleA
lstrcmpA
GetTickCount
HeapAlloc
GetCurrentProcess
HeapDestroy
GetOEMCP
FindResourceA
GetDiskFreeSpaceA
FormatMessageA
CreateFileA
FreeLibrary
GetACP
GetFullPathNameA
WriteFile
GlobalFindAtomA
ResetEvent
GetThreadLocale
GlobalAlloc
FreeResource
LocalAlloc
LoadLibraryA
LoadLibraryExA
DeleteCriticalSection
lstrcatA
LoadResource
GetLastError
GetFileSize
WaitForSingleObject
GetCurrentThreadId
lstrlenA
SetEvent
GetLocaleInfoA
Sleep
WideCharToMultiByte
CloseHandle
SetEndOfFile
MoveFileA
GetCurrentProcessId
GetStringTypeA
VirtualAlloc
VirtualQuery
GetSystemDefaultLangID
GetStringTypeW
ExitThread
lstrcpyA
HeapFree
FindClose
GetDateFormatA
LocalReAlloc
SetErrorMode
SizeofResource
MulDiv
GetStdHandle
GetFileAttributesA
SetThreadLocale
SetLastError
shell32
SHFileOperationA
SHGetDesktopFolder
SHGetFileInfoA
version
VerFindFileA
GetFileVersionInfoSizeA
ntdll
atol
RtlDeleteCriticalSection
comdlg32
GetFileTitleA
ChooseColorA
msvcrt
pow
strncmp
clock
strlen
swprintf
_acmdln
memmove
log
exp
memcpy
calloc
tolower
Sections
CODE Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 121KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ