Static task
static1
Behavioral task
behavioral1
Sample
88fa4d1aad0ac4e1421e33e091168e4a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
88fa4d1aad0ac4e1421e33e091168e4a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
88fa4d1aad0ac4e1421e33e091168e4a_JaffaCakes118
-
Size
255KB
-
MD5
88fa4d1aad0ac4e1421e33e091168e4a
-
SHA1
b0a05edd87cbc302f352a0d9bb255bde9eadf732
-
SHA256
016d0c81c31de407728496cb69e121ef77fdeef4b1e229b65112ba1b12441778
-
SHA512
304202c30808dda39deac4662ed93feeeeb6a1c0dc13f1760c744fafdd72ebeee4bebb45c598822aca1ed306ef139a2214bffe85c6baebc1e603a56df50028a4
-
SSDEEP
6144:1HBfX+oCSUhfwvscIqwF/OtVf9IxWlAr7TWgQkpUyV:V1uoQfwGqwAtVTl8agBUY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 88fa4d1aad0ac4e1421e33e091168e4a_JaffaCakes118
Files
-
88fa4d1aad0ac4e1421e33e091168e4a_JaffaCakes118.exe windows:4 windows x86 arch:x86
5f20a215fdcb0cc094aaf5309ceb7f3d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetLastError
GetTickCount
GetCurrentProcess
MultiByteToWideChar
GetSystemDirectoryW
GetVersionExA
GetProcessHeap
GetStartupInfoW
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsAlloc
GetCurrentThreadId
HeapCreate
ExitProcess
GetModuleFileNameA
GetEnvironmentStringsW
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
Sleep
GetLocaleInfoA
InitializeCriticalSection
LoadLibraryA
GetModuleHandleW
GetProcAddress
user32
GetSystemMetrics
RemoveMenu
IsChild
MonitorFromRect
InsertMenuA
GetForegroundWindow
CharLowerA
DialogBoxIndirectParamA
GetScrollPos
RegisterClassExW
RegisterWindowMessageW
MoveWindow
DefWindowProcA
RegisterClassExA
GetActiveWindow
SetDlgItemTextA
DialogBoxIndirectParamW
MessageBoxA
SetCapture
LoadMenuA
CreatePopupMenu
DialogBoxParamA
CreateDialogIndirectParamA
SetParent
CharNextW
EnableMenuItem
GetClassInfoA
wvsprintfW
CheckMenuItem
CharUpperW
InvalidateRgn
IsIconic
TrackPopupMenuEx
PeekMessageW
GetDCEx
EnableWindow
EmptyClipboard
GetSysColor
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
CloseServiceHandle
StartServiceW
OpenServiceW
OpenSCManagerW
resutils
ResUtilGetProperty
ResUtilVerifyPrivatePropertyList
ResUtilStartResourceService
ResUtilSetSzValue
ResUtilFreeParameterBlock
ClusWorkerCheckTerminate
ResUtilSetBinaryValue
ResUtilFindBinaryProperty
ResUtilSetResourceServiceEnvironment
ResUtilVerifyService
ResUtilSetExpandSzValue
gdi32
GetTextExtentPointA
GetEnhMetaFileW
CreateFontIndirectW
CreateScalableFontResourceW
CreateBitmapIndirect
GetEnhMetaFileA
CreateFontW
kbdbene
KbdLayerDescriptor
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 1024B - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 106KB - Virtual size: 190KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 3KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 391KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 111KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ