Static task
static1
Behavioral task
behavioral1
Sample
88a3e6d5e4dc53e57271632c78f70667_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
88a3e6d5e4dc53e57271632c78f70667_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
88a3e6d5e4dc53e57271632c78f70667_JaffaCakes118
-
Size
108KB
-
MD5
88a3e6d5e4dc53e57271632c78f70667
-
SHA1
228598bb537f751d4cde43aa6af4a472c718b1a1
-
SHA256
8c0399cad340312e89b90d93112a16cd8ef1ca486b4703a2bf01de089d02cf0a
-
SHA512
ab790b3364cc1bf728d5b29dee62304b9dc038ff89a3047aac62a1156a5baa120d7426ee4b181969e47153a565dd9bcd4e4a1d3dff3c12eb51cc3ea748d58de8
-
SSDEEP
1536:h0M1eFTl6jB4Uyk4IRi3VGnPgOf0gfQQfhp2RzQPZsd4bH3Sz:hh1exuqk4IElqsjQfhp2RRwHC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 88a3e6d5e4dc53e57271632c78f70667_JaffaCakes118
Files
-
88a3e6d5e4dc53e57271632c78f70667_JaffaCakes118.exe windows:4 windows x86 arch:x86
4da67dfa24db2d6503cba52ee5d2de76
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathIsDirectoryA
shell32
SHGetDiskFreeSpaceA
ole32
WriteClassStm
CLSIDFromProgID
CoDisconnectObject
StgCreateDocfileOnILockBytes
CoTaskMemFree
CreateStreamOnHGlobal
kernel32
SetEvent
GetModuleHandleA
WriteFile
GetACP
SizeofResource
VirtualAlloc
ExitProcess
GetDateFormatA
WaitForSingleObject
GetProcAddress
MoveFileA
FreeResource
LocalReAlloc
GetEnvironmentStrings
CreateEventA
ExitThread
gdi32
CreateBitmap
version
VerFindFileA
VerInstallFileA
user32
GetActiveWindow
GetCursorPos
CallNextHookEx
SetScrollInfo
SetForegroundWindow
CharUpperBuffA
GetMenuItemInfoA
OffsetRect
RemovePropA
SetRect
SetWindowLongW
SetPropA
OpenClipboard
DrawIconEx
MapWindowPoints
GetCursor
InsertMenuA
EndPaint
GetWindowPlacement
CreateWindowExA
GetScrollInfo
SendMessageA
GetWindowDC
CreateMenu
DeleteMenu
IsZoomed
DefWindowProcA
GetMenuItemCount
SetScrollPos
CharNextW
IsWindow
DefMDIChildProcA
GetWindow
PostQuitMessage
ShowOwnedPopups
InsertMenuItemA
GetTopWindow
GetClassInfoA
GetKeyboardState
GetWindowTextA
UpdateWindow
DispatchMessageA
GetClassLongA
GetDesktopWindow
BeginPaint
WaitMessage
CharNextA
RedrawWindow
PtInRect
GetSysColorBrush
GetClipboardData
DestroyIcon
SetClassLongA
SetWindowPlacement
InflateRect
CharLowerA
FillRect
GetFocus
SetCapture
IsWindowEnabled
GetMenuState
GetWindowRect
GetMenuStringA
ScreenToClient
SetFocus
MessageBoxA
WindowFromPoint
PeekMessageA
GetLastActivePopup
ShowWindow
IsDialogMessageW
ActivateKeyboardLayout
GetSystemMetrics
RegisterWindowMessageA
LoadIconA
UnregisterClassA
GetKeyboardLayoutList
MapVirtualKeyA
SetClipboardData
SetWindowLongA
LoadBitmapA
MsgWaitForMultipleObjects
DrawEdge
DrawFrameControl
ShowScrollBar
IsWindowVisible
GetPropA
DestroyWindow
FrameRect
CloseClipboard
GetKeyboardLayoutNameA
EnumThreadWindows
CharLowerBuffA
DrawTextA
CharToOemA
Sections
CODE Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE