Static task
static1
Behavioral task
behavioral1
Sample
7201010370e4b2d1e5153bf95181c768_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7201010370e4b2d1e5153bf95181c768_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7201010370e4b2d1e5153bf95181c768_JaffaCakes118
-
Size
5KB
-
MD5
7201010370e4b2d1e5153bf95181c768
-
SHA1
88db9a7e99d24714cc03a0069830414d707aa991
-
SHA256
6a518146a65343133a6e84fca5ba7ef3db7accdff0ad74acad80bdb20ad9da85
-
SHA512
1c179fb8f6149651758a0db5377dcc79fed010d001fc4cfb0a70832f20b8479aa60cc6c8266cc023c35d78143caacd5f765a2579c003b10b9cad24169ce2fd3c
-
SSDEEP
96:LTmF1jimx0AnyumL0q2bF8uiP42hpp4MuipK8Qcd:LTmPR0YYL0q2p8ug4ap4M1KY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7201010370e4b2d1e5153bf95181c768_JaffaCakes118
Files
-
7201010370e4b2d1e5153bf95181c768_JaffaCakes118.exe windows:4 windows x86 arch:x86
f81af9ccd413a5b297f325fafb0da992
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
UnhookWindowsHookEx
ShowWindow
SetWindowsHookExA
SetWindowPos
SetWindowLongA
SetTimer
SetLayeredWindowAttributes
UnregisterHotKey
SendMessageA
RegisterHotKey
KillTimer
GetWindowTextA
GetWindowLongA
GetForegroundWindow
GetDlgItemTextA
GetClassNameA
SetForegroundWindow
EnumWindows
EndDialog
DialogBoxIndirectParamA
CallNextHookEx
kernel32
lstrlenW
lstrcpyW
lstrcmpA
lstrcatW
WideCharToMultiByte
SetFileTime
MultiByteToWideChar
GlobalFree
GlobalAlloc
GetModuleHandleA
GetFileTime
GetCurrentThreadId
GetCommandLineA
ExitProcess
CreateFileW
CopyFileA
CloseHandle
shell32
SHGetFolderPathW
advapi32
RegSetValueExW
RegCreateKeyExW
RegCloseKey
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE