Static task
static1
Behavioral task
behavioral1
Sample
021142eee8368dca2462f17ac386d95e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
021142eee8368dca2462f17ac386d95e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
021142eee8368dca2462f17ac386d95e_JaffaCakes118
-
Size
49KB
-
MD5
021142eee8368dca2462f17ac386d95e
-
SHA1
3d6b0c4c8e6bc612d6673f300da60b8a4d155764
-
SHA256
786ea4c1b6439a28afd4cca7cec3bd997b6afa04cf29f359799edfc3a725d36b
-
SHA512
db7076fcbf3e89fde50e81b655e1dd769d1cd90b6cd680d476d48505b0ae2d2ea60f6520735e2c40220a0c8503bf9c83903b00956bdfa86ccfdbcc9461fa2513
-
SSDEEP
768:9z5/pNTFMpqQIBtHzPXAN94w39vNY9xJYSURxGjMw48Z31tzmW7yiXQyD0utxdIE:p5BQpqQ6z4XvNvNOJYBxAZ31B7y9/ad
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 021142eee8368dca2462f17ac386d95e_JaffaCakes118
Files
-
021142eee8368dca2462f17ac386d95e_JaffaCakes118.exe windows:5 windows x86 arch:x86
f1382261c7e314430dd8321509e704d3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowLongW
GetForegroundWindow
OpenDesktopA
GetDlgItem
GetMessageW
GetDlgItemTextW
PeekMessageW
ExitWindowsEx
GetCursorPos
SetThreadDesktop
GetClipboardData
FindWindowExW
GetIconInfo
CloseWindowStation
CharLowerBuffA
GetWindowTextW
OpenWindowStationA
LoadCursorW
PeekMessageA
DrawIcon
DispatchMessageW
MsgWaitForMultipleObjects
GetWindowThreadProcessId
SetProcessWindowStation
GetDlgItemTextA
GetClassNameW
GetMessageA
CloseDesktop
EndDialog
GetKeyboardState
ToUnicode
SendMessageW
GetKeyState
kernel32
CreateFileMappingW
OpenProcess
SetFilePointer
FindNextFileW
GetCommandLineA
HeapReAlloc
GlobalLock
GetFileSize
CreateProcessW
CreateDirectoryW
lstrcatW
GetLastError
LeaveCriticalSection
ExpandEnvironmentStringsW
WriteFile
CreateMutexW
SetThreadPriority
CopyFileW
lstrcmpiA
GetVersionExW
GetLocalTime
GetTickCount
GetThreadPriority
GetSystemTimeAsFileTime
SetFileAttributesW
ResetEvent
FindFirstFileW
OpenMutexW
lstrcpyA
ReadFile
GetExitCodeProcess
lstrlenW
SetEndOfFile
IsBadReadPtr
lstrcmpiW
SystemTimeToFileTime
lstrcatA
HeapFree
GetModuleHandleA
UnmapViewOfFile
MultiByteToWideChar
GetTempPathW
GetLogicalDrives
DeleteFileW
WideCharToMultiByte
GetComputerNameW
CloseHandle
GetUserDefaultUILanguage
GlobalUnlock
CreateThread
lstrcpynW
CreateFileW
CreateEventW
lstrlenA
FindResourceW
GetCurrentThreadId
GetDriveTypeW
Sections
.yvytmr Size: 39KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wxij Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lmdsf Size: 7KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ