Static task
static1
Behavioral task
behavioral1
Sample
6ad0a5524b21a106e16c83b106d6a6ae_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6ad0a5524b21a106e16c83b106d6a6ae_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6ad0a5524b21a106e16c83b106d6a6ae_JaffaCakes118
-
Size
184KB
-
MD5
6ad0a5524b21a106e16c83b106d6a6ae
-
SHA1
e4f1a1572d673c71f9af23576f53ece2936bd6c4
-
SHA256
474a4049c1dcb61cadb4f956b0bb5455b0dcadc9ee3226ee3442f140dba0a7b4
-
SHA512
254910053387580ce51891ef5ee53304df89a6801d7f44a88bf5f1a62944e97aee34333acb5dedd5f9150f5a76e83ec2ad75ae927f1d92fa09e913239c95946b
-
SSDEEP
3072:kkBVMGqfKAWCVOdQZ3Uoo8YX/+vfpVOzJVt+8/oktG/5AKQIZByasONwqJu:nBqGq/WUZkAYP+npAzJVE8/JtQ5Jju3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6ad0a5524b21a106e16c83b106d6a6ae_JaffaCakes118
Files
-
6ad0a5524b21a106e16c83b106d6a6ae_JaffaCakes118.exe windows:4 windows x86 arch:x86
e674761a4168d0a53b7eccf8b86dd96f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdiplus
GdipCreateHBITMAPFromBitmap
GdipCloneImage
user32
DrawAnimatedRects
TrackPopupMenu
DestroyWindow
IsMenu
SetForegroundWindow
GetTabbedTextExtentW
MoveWindow
GetForegroundWindow
ShowWindow
PeekMessageW
SetFocus
SetWindowRgn
LockWindowUpdate
MapVirtualKeyW
SetActiveWindow
GetLastActivePopup
FindWindowW
EnumChildWindows
GetMenuItemInfoW
CloseWindow
RegisterWindowMessageW
CreatePopupMenu
GetNextDlgTabItem
DestroyMenu
comctl32
InitCommonControlsEx
ImageList_Destroy
ImageList_ReplaceIcon
ImageList_Add
_TrackMouseEvent
ImageList_AddMasked
ImageList_LoadImageW
PropertySheetW
ImageList_GetImageCount
ImageList_GetImageInfo
ImageList_GetIcon
ImageList_Draw
ole32
DoDragDrop
CoCreateInstance
OleRun
advapi32
RegOpenKeyW
RegSetValueExW
RegDeleteValueW
RegCreateKeyExW
RegQueryValueExW
RegDeleteKeyW
RegOpenKeyExW
RegEnumKeyExW
RegEnumValueW
RegCloseKey
gdi32
GetStockObject
GetDIBits
Rectangle
RoundRect
ExtFloodFill
GetTextExtentPoint32W
GetBkColor
GetCharWidthW
SetBoundsRect
StretchDIBits
SetDIBits
CreateFontW
Escape
SetPixelV
CreateRectRgnIndirect
GetTextColor
CombineRgn
Ellipse
GetTextAlign
EnumFontFamiliesW
CreateDIBSection
kernel32
LoadLibraryW
FindClose
WideCharToMultiByte
GetPrivateProfileIntW
GetSystemTimeAsFileTime
LockResource
GetACP
QueryDosDeviceW
WritePrivateProfileStringW
GetCurrentDirectoryW
FindCloseChangeNotification
FreeLibrary
FileTimeToLocalFileTime
lstrcpynW
SetFileAttributesW
GlobalFree
LoadLibraryA
GetProcessId
FindResourceW
QueryPerformanceCounter
MultiByteToWideChar
GlobalAlloc
FindFirstChangeNotificationW
GetLocaleInfoA
WaitForSingleObject
InterlockedDecrement
GetNumberFormatW
GetModuleFileNameW
GetProcAddress
EnumResourceTypesA
FindFirstFileW
GetVersionExA
MulDiv
InitializeCriticalSection
lstrcpyW
GlobalUnlock
LoadLibraryExW
DeleteCriticalSection
GetLastError
LocalFree
FindNextChangeNotification
FileTimeToSystemTime
GetCurrentThreadId
GetVersionExW
InterlockedIncrement
GlobalSize
GetModuleHandleW
SetThreadPriority
lstrcmpW
GetFileAttributesW
GetThreadLocale
CreateThread
ExitProcess
GetLocaleInfoW
GetTickCount
GetVersion
Sleep
GetPrivateProfileStringW
GlobalLock
CloseHandle
DeleteFileW
ResumeThread
InterlockedExchange
LoadResource
lstrlenW
GetCurrentProcessId
Sections
.text Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ