Static task
static1
Behavioral task
behavioral1
Sample
84491ab325259433474fc779768a00ef_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
84491ab325259433474fc779768a00ef_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
84491ab325259433474fc779768a00ef_JaffaCakes118
-
Size
430KB
-
MD5
84491ab325259433474fc779768a00ef
-
SHA1
c6c7f1d78f434d36c9f7fed4596c649936385592
-
SHA256
9704c78f0fe9f776901b63a606214419af84381f165925e6766d7fb972ee4612
-
SHA512
76f6953bfca0efbcd45a3717477e6d647423e0822b4b04bf6c39f245ea78584d34cd2b539fd63a07ef37a99ec0181ca8563f36a31fd5f16a547673ccc158457c
-
SSDEEP
6144:7OFcv5fF7GwhhXZ4P4kC4GKTQJCCYjK4zYf4Q5LRszBsF9W7/ps6+jnNOWHMY5Jb:FHv4P4J2TWEKIYf4Q5LRuCUGxSfFo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84491ab325259433474fc779768a00ef_JaffaCakes118
Files
-
84491ab325259433474fc779768a00ef_JaffaCakes118.exe windows:4 windows x86 arch:x86
494ab5ecf663cf79d3ad856973dbc98b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CascadeWindows
GetDlgCtrlID
IsWindowVisible
SetWindowPlacement
GetTopWindow
CloseWindow
GetWindowTextLengthA
GetParent
BringWindowToTop
SendDlgItemMessageA
GetSysColor
ole32
StgIsStorageILockBytes
CoInstall
CoGetObject
ReadClassStg
OleCreateLinkToFileEx
CLSIDFromString
OleCreateLink
CoUnmarshalInterface
CoIsHandlerConnected
CoTreatAsClass
FmtIdToPropStgName
CoRegisterPSClsid
oledlg
ord6
ord12
ord10
ord3
ord11
ord7
ord4
ord1
ord8
ord2
oleaut32
OleSavePictureFile
advapi32
RegSaveKeyA
RegEnumKeyA
RegLoadKeyA
RegCloseKey
RegDeleteKeyA
RegFlushKey
RegDeleteValueA
RegSetValueExA
RegConnectRegistryA
RegOpenKeyExA
kernel32
GetModuleHandleA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetProcAddress
GetStdHandle
GetFileType
GetCurrentThreadId
TlsSetValue
TlsAlloc
GetStringTypeW
TlsGetValue
GetLastError
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
GetStartupInfoA
GetStringTypeA
SetLastError
RtlUnwind
SetHandleCount
PulseEvent
ReleaseSemaphore
LocalLock
LocalFlags
HeapLock
LocalAlloc
VirtualAllocEx
CreateEventA
GlobalFree
GetOverlappedResult
HeapValidate
GetPrivateProfileIntA
GetPrivateProfileStructA
GetProfileStringA
WritePrivateProfileStructA
WritePrivateProfileStringA
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
HeapReAlloc
VirtualAlloc
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 292KB - Virtual size: 378KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pbwrfb Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ