Static task
static1
Behavioral task
behavioral1
Sample
7794f3079f6462f3b677287b2cb2da5a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7794f3079f6462f3b677287b2cb2da5a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7794f3079f6462f3b677287b2cb2da5a_JaffaCakes118
-
Size
524KB
-
MD5
7794f3079f6462f3b677287b2cb2da5a
-
SHA1
06a345ef863ababa983cbc6581cc11524722e14c
-
SHA256
3267b4d2eb7abfef81f835e8dea2ebcfef17da2a11133bbf9fff1926a3ceee93
-
SHA512
2aba94e755336acc4b23728e55dcc11cca939dc13df01933aeedaa2e7ef5d4f4621f811be6f02e47e0725a13d802e931e583d0b70e872b7ebf0788c955f0d340
-
SSDEEP
12288:tYAS2q3G5m8a4LUCXJGzFvx3HwdVcdF0F1pgFFioueq+OO:LdZm89LUCEpJ38CdS1pAFjueqr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7794f3079f6462f3b677287b2cb2da5a_JaffaCakes118
Files
-
7794f3079f6462f3b677287b2cb2da5a_JaffaCakes118.exe windows:5 windows x86 arch:x86
ef070210b4e2a875cb615627897c3dc0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PostQuitMessage
SetWindowPos
IsWindow
GetDC
GetCursorPos
ReleaseDC
UnregisterClassA
ScreenToClient
DestroyWindow
GetMessageA
GetParent
UpdateWindow
EnableWindow
PeekMessageA
IsWindowEnabled
GetWindow
LoadStringA
RegisterClassA
GetWindowLongA
CreateWindowExA
EndPaint
SetFocus
BeginPaint
DefWindowProcA
GetSystemMetrics
GetWindowRect
PostMessageA
SetWindowLongA
EndDialog
DispatchMessageA
SetTimer
GetDlgItem
ClientToScreen
LoadCursorA
LoadIconA
SetForegroundWindow
GetFocus
GetSysColor
InvalidateRect
SendMessageA
GetClientRect
CallWindowProcA
SetCursor
kernel32
InterlockedIncrement
RtlUnwind
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
FileTimeToSystemTime
WaitForSingleObject
HeapDestroy
GetFileAttributesW
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetCurrentDirectoryA
GetConsoleMode
GetLocaleInfoA
LocalAlloc
lstrcatA
LoadLibraryExW
FreeEnvironmentStringsW
GetTempPathA
WideCharToMultiByte
GetStringTypeA
VirtualAlloc
Sleep
VirtualFree
UnmapViewOfFile
IsValidCodePage
GetModuleHandleW
GetACP
FindNextFileW
SetUnhandledExceptionFilter
ReadFile
SetFilePointer
TlsFree
RaiseException
GetCurrentThread
InterlockedCompareExchange
GetCommandLineA
GetCPInfo
GetCommandLineW
GetCurrentProcessId
GetEnvironmentStrings
FileTimeToLocalFileTime
lstrlenW
GlobalAlloc
GlobalUnlock
GetEnvironmentStringsW
LCMapStringA
FindResourceW
GetConsoleCP
lstrlenA
GetSystemInfo
HeapCreate
SetStdHandle
GetLastError
LeaveCriticalSection
ExitProcess
TlsSetValue
GetFileType
CreateEventA
DuplicateHandle
FindNextFileA
ResetEvent
GetDiskFreeSpaceA
GlobalFree
FindFirstFileA
CompareStringW
GetProcessHeap
GetProcAddress
DeleteFileW
GetEnvironmentVariableA
GetWindowsDirectoryA
DeleteFileA
LCMapStringW
GetFileSize
GetStartupInfoA
FreeLibrary
LoadLibraryA
GetVersionExA
TlsAlloc
GetTickCount
SetEvent
LoadLibraryW
SetHandleCount
EnterCriticalSection
HeapFree
CloseHandle
WriteConsoleW
GetCurrentThreadId
SetEndOfFile
VirtualQuery
GetVersion
WriteConsoleA
TerminateProcess
MulDiv
CreateFileA
CreateThread
GetModuleHandleA
MultiByteToWideChar
UnhandledExceptionFilter
LoadLibraryExA
GetModuleFileNameA
FlushFileBuffers
HeapAlloc
IsDebuggerPresent
VirtualProtect
GetModuleFileNameW
TlsGetValue
SetLastError
FormatMessageA
InterlockedDecrement
FindClose
LoadResource
InitializeCriticalSection
FormatMessageW
LocalFree
GetOEMCP
GetFullPathNameA
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
WriteFile
InterlockedExchange
advapi32
RegCloseKey
RegSetValueExW
RegQueryValueExW
RegCreateKeyExA
RegOpenKeyExW
RegSetValueExA
gdi32
SetTextColor
DeleteObject
SetBkColor
SetBkMode
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 502KB - Virtual size: 501KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 880B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ