Static task
static1
Behavioral task
behavioral1
Sample
71a2fc36be49d6e7d9a42525adc244e8_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
71a2fc36be49d6e7d9a42525adc244e8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
71a2fc36be49d6e7d9a42525adc244e8_JaffaCakes118
-
Size
20KB
-
MD5
71a2fc36be49d6e7d9a42525adc244e8
-
SHA1
6b21304161da262e4e3b2ff5aad60ba9fd216624
-
SHA256
c0837df302e3c2b90a44aeeea2518adc733502f84c57fa8d5f0320df604665e1
-
SHA512
166ca9377b59ee70e8a05425d4735927d1dd630db7f9af19698092026527d2c96122ee8035deb21c569a674f7c6bf143bf98a46b7accb0cc94cfe0bc695ba1cf
-
SSDEEP
384:pOQs7Zz2bUw0+P+X0FruOPnQxX9DomEBTshng0NfIkEO:pOp7EbUw0+2XG9QxSbTB0/p
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 71a2fc36be49d6e7d9a42525adc244e8_JaffaCakes118
Files
-
71a2fc36be49d6e7d9a42525adc244e8_JaffaCakes118.exe windows:4 windows x86 arch:x86
305d4702de8cf99174e4534d69358663
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
crtdll
memset
strcpy
strlen
sprintf
strcmp
strncmp
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
CloseHandle
GetCurrentThreadId
GetCurrentProcessId
HeapAlloc
HeapFree
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
MulDiv
HeapReAlloc
ole32
RevokeDragDrop
gdi32
GetStockObject
SetTextColor
SetBkColor
CreateSolidBrush
DeleteObject
CreateDCA
GetDeviceCaps
CreateFontA
DeleteDC
comctl32
InitCommonControls
InitCommonControlsEx
user32
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
CreateDesktopA
SetThreadDesktop
SwitchDesktop
SetTimer
CloseDesktop
CloseWindowStation
GetUserObjectInformationA
OpenInputDesktop
MessageBoxA
GetWindowThreadProcessId
IsWindowVisible
IsWindowEnabled
GetForegroundWindow
EnableWindow
EnumWindows
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
CreateWindowExA
SendMessageA
SetWindowLongA
GetSysColor
GetSysColorBrush
GetWindowLongA
PostMessageA
CallWindowProcA
DestroyWindow
RemovePropA
SetPropA
GetParent
GetPropA
RedrawWindow
GetWindow
SetActiveWindow
UnregisterClassA
DestroyAcceleratorTable
LoadIconA
LoadCursorA
ShowWindow
IsZoomed
SetWindowPos
PeekMessageA
MsgWaitForMultipleObjects
GetMessageA
GetActiveWindow
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
RegisterClassA
AdjustWindowRect
GetSystemMetrics
GetWindowRect
CreateAcceleratorTableA
SetCursorPos
LoadImageA
SetCursor
SystemParametersInfoA
GetKeyState
SetCapture
GetCursorPos
MapWindowPoints
ReleaseCapture
MoveWindow
SetFocus
GetFocus
IsChild
GetClassNameA
EnumChildWindows
GetClientRect
FillRect
DefWindowProcA
Sections
.code Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 11B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 736B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.flat Size: 512B - Virtual size: 45B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE