Static task
static1
Behavioral task
behavioral1
Sample
756d7126294e2185d0d87c58e22fa30d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
756d7126294e2185d0d87c58e22fa30d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
756d7126294e2185d0d87c58e22fa30d_JaffaCakes118
-
Size
255KB
-
MD5
756d7126294e2185d0d87c58e22fa30d
-
SHA1
770329fce15a428ffb9645e29218990c9e2745fb
-
SHA256
d5c6e8584684a55fbee155097bcee5085d74dcd903d6843973455cdd45a484de
-
SHA512
a17a7c6ce6119f4fe6b4632dd6e06674af2bbf619af79484fa563c8a5a7af7df36e019b0585fd9deeb2b87986ee300408b44354db4dfe118444cf7ae555a75d4
-
SSDEEP
6144:2WFLIoTvEFeRIedJ87Zn4k8q+Xj+F8IH7O/E:hhT6eGmC4nz+F8IbO/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 756d7126294e2185d0d87c58e22fa30d_JaffaCakes118
Files
-
756d7126294e2185d0d87c58e22fa30d_JaffaCakes118.exe windows:4 windows x86 arch:x86
fd0f06ecbd5d0bb74c2399a2769ad23d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EnableWindow
SendMessageW
ClientToScreen
GetWindowThreadProcessId
IsIconic
IsWindow
EnableMenuItem
GetForegroundWindow
GetParent
RegisterWindowMessageW
SetCursor
LoadCursorW
GetWindowLongW
DefWindowProcW
LoadStringW
GetClientRect
FindWindowW
GetActiveWindow
SetForegroundWindow
SystemParametersInfoW
MonitorFromWindow
SetWindowPos
GetDesktopWindow
CallWindowProcW
GetWindowRect
EnumChildWindows
TrackPopupMenuEx
AttachThreadInput
FlashWindow
MonitorFromPoint
GetSystemMenu
GetSystemMetrics
LoadIconW
GetWindow
SetWindowLongW
ShowWindow
CharNextW
PostMessageW
GetMonitorInfoW
GetDlgItem
MapWindowPoints
AllowSetForegroundWindow
GetClassNameW
IsWindowEnabled
ole32
CoCreateInstance
CoTaskMemFree
CLSIDFromProgID
CoGetMalloc
StringFromCLSID
CoTaskMemAlloc
CoTaskMemRealloc
oleaut32
VarUI4FromStr
kernel32
HeapSize
SetCurrentDirectoryW
OutputDebugStringW
LocalFree
VirtualAlloc
GetCurrentThreadId
GetTempPathW
FindResourceW
IsDebuggerPresent
CloseHandle
UnhandledExceptionFilter
LeaveCriticalSection
LocalAlloc
FlushInstructionCache
FindResourceExW
SizeofResource
GetCurrentDirectoryW
RaiseException
GetFileSize
lstrcmpiW
LockResource
lstrlenA
GetShortPathNameW
DeleteCriticalSection
lstrlenW
ReadFile
ProcessIdToSessionId
WideCharToMultiByte
GetModuleHandleW
LoadLibraryExW
HeapReAlloc
DisableThreadLibraryCalls
LoadResource
EnterCriticalSection
SetUnhandledExceptionFilter
GetProcessHeap
HeapAlloc
IsProcessorFeaturePresent
FormatMessageW
GetUserDefaultLangID
VirtualFree
HeapFree
CreateFileW
GetSystemTimeAsFileTime
WTSGetActiveConsoleSessionId
HeapDestroy
FreeLibrary
IsValidLocale
VirtualAllocEx
IsBadWritePtr
comdlg32
GetOpenFileNameW
CommDlgExtendedError
userenv
GetAllUsersProfileDirectoryW
GetProfileType
GetProfilesDirectoryW
EnterCriticalPolicySection
DeleteProfileA
panmap
DllCanUnloadNow
Sections
.text Size: 223KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.omiFFHX Size: 1024B - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.TtiEFEX Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hHrqLvX Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pPtnLvX Size: 1024B - Virtual size: 871B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hsalxlv Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rWlDynv Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ