Static task
static1
Behavioral task
behavioral1
Sample
846513454ef08c91bdb72a5ca39866d3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
846513454ef08c91bdb72a5ca39866d3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
846513454ef08c91bdb72a5ca39866d3_JaffaCakes118
-
Size
52KB
-
MD5
846513454ef08c91bdb72a5ca39866d3
-
SHA1
3d7f8d8a85c38b448990e002747e30bde133e846
-
SHA256
0fdcec524daf338a7b812891208837a95c2ef1713ccdc2b4f9a34916a6f44f3c
-
SHA512
8992a109627add6cff96e49d0f09f21584dcbff395a0a556237a4e31c6b9c28abb9dcbf995f90a4238430252e1fd5fb78dcf688b4b103d5db6936c51cc33d2c4
-
SSDEEP
768:Bl082KJKb4rUbVsZlW6rR//uZZDlzzzzQbJPAPSgBidMYJ:r2DU0p6tKydY4dMYJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 846513454ef08c91bdb72a5ca39866d3_JaffaCakes118
Files
-
846513454ef08c91bdb72a5ca39866d3_JaffaCakes118.exe windows:4 windows x86 arch:x86
82aaf268e3f5f0b7656004c6b7c7c57c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
sprintf
strcmp
strncmp
fclose
fabs
ceil
malloc
floor
free
strlen
memmove
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
GetCurrentProcess
HeapAlloc
HeapFree
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
HeapReAlloc
DeleteCriticalSection
LoadLibraryA
GetProcAddress
FreeLibrary
GetVersionExA
WaitForMultipleObjects
CloseHandle
GetCurrentThreadId
GetCurrentThread
DuplicateHandle
CreateSemaphoreA
CreateThread
ReleaseSemaphore
user32
ExitWindowsEx
DestroyWindow
GetSysColor
GetSysColorBrush
CreateWindowExA
SendMessageA
RedrawWindow
GetWindowLongA
CallWindowProcA
RemovePropA
SetWindowLongA
DefWindowProcA
SetPropA
GetParent
GetPropA
GetWindow
SetActiveWindow
UnregisterClassA
DestroyAcceleratorTable
LoadIconA
LoadCursorA
RegisterClassA
AdjustWindowRectEx
GetSystemMetrics
GetActiveWindow
GetWindowRect
ShowWindow
CreateAcceleratorTableA
SetCursorPos
LoadImageA
SetCursor
MapWindowPoints
MoveWindow
SystemParametersInfoA
GetKeyState
SetCapture
PostMessageA
GetCursorPos
ReleaseCapture
SetFocus
GetFocus
GetClientRect
FillRect
EnumChildWindows
DefFrameProcA
PeekMessageA
MsgWaitForMultipleObjects
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
IsWindowEnabled
IsWindowVisible
IsChild
GetClassNameA
DestroyIcon
gdi32
GetStockObject
SetBkColor
SetTextColor
CreateSolidBrush
DeleteObject
GetObjectType
GetObjectA
CreateCompatibleDC
GetDIBits
DeleteDC
CreateDIBSection
SelectObject
BitBlt
CreateBitmap
SetPixel
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
comctl32
InitCommonControlsEx
ole32
RevokeDragDrop
Sections
.code Size: 1024B - Virtual size: 656B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 370B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ