Static task
static1
Behavioral task
behavioral1
Sample
8a83870001566f91e8d46f9eb8a242d2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8a83870001566f91e8d46f9eb8a242d2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8a83870001566f91e8d46f9eb8a242d2_JaffaCakes118
-
Size
64KB
-
MD5
8a83870001566f91e8d46f9eb8a242d2
-
SHA1
8b4d645b44c69de80150e8cece95b4f7293a37d0
-
SHA256
246d1a70ab17e15ff9363729a90f5c9ad5a842c22e474ebc5a03af91b9974927
-
SHA512
09402db4ba887fedff43153db0ff5a6afc25ec037cecd32efedc1d6958b20d140971d66bd003743a6430ac05121b82242353ecea4439f3e2f7cf194d00d12063
-
SSDEEP
1536:KX8lq9QOo+7HX3mMP6uy4lcjxBd0gPt1+nH4:uX9njHn6r4lcjxD00CnY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a83870001566f91e8d46f9eb8a242d2_JaffaCakes118
Files
-
8a83870001566f91e8d46f9eb8a242d2_JaffaCakes118.exe windows:1 windows x86 arch:x86
fb77b7a0d209cf836640054dcaea3abd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
user32
GetCapture
EndPaint
GetClientRect
GetClassInfoExA
EnumThreadWindows
GetDlgItem
RedrawWindow
GetDC
SendMessageA
GetClassNameA
FillRect
InsertMenuItemA
GetSysColorBrush
GetFocus
DrawEdge
SetWindowLongA
SetWindowTextA
ShowWindow
SetDlgItemTextA
SetCapture
SendDlgItemMessageA
RegisterClassExA
GetDlgCtrlID
MessageBoxA
IsWindowEnabled
IsDialogMessageA
GetWindowLongA
GetSystemMenu
GetSysColor
GetMessageA
DrawStateA
DrawIconEx
DrawTextA
DrawFocusRect
TranslateMessage
DispatchMessageA
SystemParametersInfoA
BeginPaint
CallWindowProcA
CheckDlgButton
CreateDialogIndirectParamA
CreateDialogParamA
DefWindowProcA
DialogBoxParamA
ReleaseDC
ReleaseCapture
LoadIconA
GetWindowTextA
EnableMenuItem
PostQuitMessage
LoadCursorA
EnableWindow
EndDialog
gdi32
SetBkMode
SetBkColor
SelectObject
CreateSolidBrush
CreateDIBitmap
CreateFontIndirectA
DeleteObject
SetTextColor
kernel32
UnmapViewOfFile
TerminateProcess
GetTempPathA
SuspendThread
Sleep
GetTempFileNameA
ExitProcess
SetLastError
SetFilePointer
GetModuleHandleA
DeleteFileA
CloseHandle
SetFileAttributesA
GetModuleFileNameA
ResumeThread
CreateFileA
ReadProcessMemory
MapViewOfFile
GetLastError
LocalFree
GlobalFree
GetFileSize
CreateProcessA
lstrlen
GlobalAlloc
lstrcpy
lstrcat
GetWindowsDirectoryA
GetCommandLineA
WriteProcessMemory
WriteFile
GetTickCount
WaitForSingleObject
VirtualProtectEx
GetThreadContext
FormatMessageA
CreateFileMappingA
CopyFileA
shell32
ShellExecuteA
DragQueryFileA
DragFinish
DragAcceptFiles
comdlg32
GetOpenFileNameA
Sections
CODE Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.crk Size: 56KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE