Static task
static1
Behavioral task
behavioral1
Sample
8b643641801cd3c3f71696bb57ad5f90_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8b643641801cd3c3f71696bb57ad5f90_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8b643641801cd3c3f71696bb57ad5f90_JaffaCakes118
-
Size
49KB
-
MD5
8b643641801cd3c3f71696bb57ad5f90
-
SHA1
8704ea25c53734d2e1aec8466ee669224392b140
-
SHA256
b69b4bf98d37a83ad06ba0cb416dd5568b1b0eb93f0c9051df06a8a46a0100af
-
SHA512
d838d4ffc1594e30a8464241a63c58dc600ff6b7523b1ead5db2375b3f432b9482073391a72feb3dc65d619f97325cda59f9310476fa1fb49b31625205a35d5f
-
SSDEEP
768:PizoPqNRVMYbjR9RrqoGCplEtSVqtiLmklDsngbl0cjeQ2tqrLn6F+w:qzEqNRVZJr2CpltLHtblq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b643641801cd3c3f71696bb57ad5f90_JaffaCakes118
Files
-
8b643641801cd3c3f71696bb57ad5f90_JaffaCakes118.exe windows:5 windows x86 arch:x86
e309e596115f7d4495d81530ffa8e2a2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SendMessageW
FindWindowExW
GetDlgItem
GetKeyState
PeekMessageW
LoadCursorW
GetDlgItemTextW
GetMessageA
OpenDesktopA
GetMessageW
GetKeyboardState
GetClipboardData
GetWindowThreadProcessId
ToUnicode
DrawIcon
GetClassNameW
GetCursorPos
GetWindowTextW
SetProcessWindowStation
EndDialog
PeekMessageA
CloseWindowStation
ExitWindowsEx
GetIconInfo
GetForegroundWindow
MsgWaitForMultipleObjects
CloseDesktop
OpenWindowStationA
GetWindowLongW
SetThreadDesktop
CharLowerBuffA
DispatchMessageW
GetDlgItemTextA
kernel32
MoveFileExW
SystemTimeToFileTime
WriteProcessMemory
GetLocalTime
CreateMutexW
OpenMutexW
UnmapViewOfFile
SetFileAttributesW
GetDriveTypeW
GetCurrentThreadId
SetEndOfFile
WriteFile
DisconnectNamedPipe
FindResourceW
GetExitCodeProcess
GetModuleHandleA
GetProcessTimes
SetLastError
InitializeCriticalSection
GetCurrentProcessId
lstrcatW
GetFileSize
CloseHandle
ResetEvent
WideCharToMultiByte
SetFilePointer
GetLogicalDrives
GetLastError
GetTimeZoneInformation
FindNextFileW
GetVersionExW
CreateFileW
lstrcmpiW
GetProcessHeap
CreateEventW
ExpandEnvironmentStringsW
SetThreadPriority
GetThreadPriority
GetTempPathW
OpenProcess
HeapReAlloc
CreateFileMappingW
ReleaseMutex
GetFileTime
SetEvent
lstrcatA
GetUserDefaultUILanguage
GetFileSizeEx
LeaveCriticalSection
FindFirstFileW
FlushFileBuffers
lstrlenA
lstrlenW
MapViewOfFile
FindClose
CreateDirectoryW
IsBadReadPtr
Sections
.zep Size: 39KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mpkp Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yvgh Size: 7KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ