Static task
static1
Behavioral task
behavioral1
Sample
857b83f7273f6c22f637a7225833a169_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
857b83f7273f6c22f637a7225833a169_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
857b83f7273f6c22f637a7225833a169_JaffaCakes118
-
Size
25KB
-
MD5
857b83f7273f6c22f637a7225833a169
-
SHA1
89cc92049a34f7a57c1a0d101b81e4ce8a0877c7
-
SHA256
90023f3b4e51ad5bef4edc2a358a2f53a8057a6eced4f19322abf1640c1d6c01
-
SHA512
087e0871ee0d094e17ea8820bfa3e710ed8e5447dd013dae6e2ae691594e3d71d89d4066111e443832d73b68b1efbbc8e0fbe4b00094a58075031a5524e32f41
-
SSDEEP
384:mXKp3qcsU/EOdzHYxyaLw6cJs9t2uyN4Oq65d5W0rcGVbXQfLlDwKD4/ovChI:mXo3QU1YFEi72unL6rvtLQZw/ThI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 857b83f7273f6c22f637a7225833a169_JaffaCakes118
Files
-
857b83f7273f6c22f637a7225833a169_JaffaCakes118.exe windows:4 windows x86 arch:x86
1976d38f80a62557da03608dfee381a6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ShowWindow
UpdateWindow
SetWindowRgn
SetWindowPos
SetWindowLongA
SetWindowTextA
TrackPopupMenu
SetFocus
SetDlgItemTextA
SetClassLongA
SetCapture
SendMessageA
ReleaseCapture
RegisterClassExA
RedrawWindow
PtInRect
OffsetRect
MessageBoxA
LoadIconA
LoadCursorA
LoadBitmapA
IsDlgButtonChecked
InvalidateRect
IntersectRect
GetWindowRect
GetWindowLongA
GetSystemMetrics
GetParent
GetKeyState
CloseClipboard
EmptyClipboard
OpenClipboard
SetClipboardData
GetClientRect
MoveWindow
GetDlgItemTextA
GetDlgItem
GetDlgCtrlID
GetDC
GetCursorPos
GetCapture
GetActiveWindow
EndDialog
EnableWindow
DrawTextA
DialogBoxParamA
DefWindowProcA
CreateWindowExA
CreatePopupMenu
CheckDlgButton
CallWindowProcA
AppendMenuA
kernel32
WriteFile
CompareStringA
GetModuleFileNameA
SetCurrentDirectoryA
CreateDirectoryA
GlobalAlloc
GlobalLock
GlobalUnlock
FlushFileBuffers
lstrlenA
lstrcpyA
lstrcmpiA
lstrcmpA
lstrcatA
WinExec
WaitForSingleObject
CloseHandle
CopyFileA
CreateFileA
CreateFileMappingA
CreateProcessA
CreateThread
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
FindResourceA
FreeLibrary
GetCommandLineA
GetCurrentDirectoryA
GetFileAttributesA
GetFileSize
GetModuleHandleA
GetProcAddress
GetTempPathA
LoadLibraryA
LoadResource
MapViewOfFile
MoveFileA
RtlMoveMemory
RtlZeroMemory
SetEndOfFile
SetEnvironmentVariableA
SetFileAttributesA
SetFilePointer
SizeofResource
Sleep
UnmapViewOfFile
VirtualAlloc
VirtualFree
shell32
ShellExecuteA
gdi32
CreateCompatibleDC
CreateFontIndirectA
CreateSolidBrush
ExtCreateRegion
GetObjectA
GetPixel
GetStockObject
BitBlt
CreateCompatibleBitmap
TextOutA
SetTextColor
SetPixel
SetBkMode
SetBkColor
SelectObject
RoundRect
RemoveFontResourceA
GetTextExtentPointA
AddFontResourceA
comctl32
InitCommonControls
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
comdlg32
GetSaveFileNameA
GetOpenFileNameA
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ