Static task
static1
Behavioral task
behavioral1
Sample
8b92e987ff83da420bd7d2fc7cfb431a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8b92e987ff83da420bd7d2fc7cfb431a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8b92e987ff83da420bd7d2fc7cfb431a_JaffaCakes118
-
Size
29KB
-
MD5
8b92e987ff83da420bd7d2fc7cfb431a
-
SHA1
c40c2ea1d5351089379dbd7b3f27f8b227ebe092
-
SHA256
04f45c1bab14c2077a3d84f78660b2f0d2f23dd4b9b623b53e7ae5ff469ce7a3
-
SHA512
2752b7a239470ef4a483cf64ecbc891545d3eee880bc173e6e97a7eb9550fe6b2f2761a48dc44e96162eb3a950117897a4b9e9706f808c2c6557c9210adb66e1
-
SSDEEP
384:vimwBWH+h15Ts6AWTNkM2AsOEs6b3sLsaHBx0tkdKxJJoZGC2h4ALR:vimwXh1ZsqTR2AhEbeH0tqKxj8G7hvV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b92e987ff83da420bd7d2fc7cfb431a_JaffaCakes118
Files
-
8b92e987ff83da420bd7d2fc7cfb431a_JaffaCakes118.exe windows:4 windows x86 arch:x86
ceb14e0b6a0d3e56f964a4ca5aebc6f2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DialogBoxIndirectParamW
SendDlgItemMessageA
GetSysColor
GetWindowLongA
DialogBoxParamW
GetDlgItemTextA
GetDlgItem
LoadStringA
EndDialog
WinHelpA
SendMessageW
SetFocus
LoadImageA
LoadCursorA
CreateWindowExW
SetCursor
ShowWindow
GetWindowRect
SetWindowLongA
MessageBeep
DialogBoxParamA
DialogBoxIndirectParamA
ReleaseDC
SendMessageA
GetParent
CallMsgFilterA
LoadBitmapA
SetDlgItemTextA
GetDC
cfgmgr32
CM_Get_Child
shlwapi
StrCatBuffW
shell32
ShellExecuteA
gdi32
SelectObject
GetTextMetricsW
GetTextExtentPointW
DeleteObject
GetTextExtentPointA
GetTextMetricsA
msi
MsiDatabaseExportW
kernel32
HeapReAlloc
DeleteCriticalSection
GetCurrentProcess
HeapAlloc
GetCurrentProcessId
InitializeCriticalSection
GetSystemTimeAsFileTime
lstrlenA
lstrlenW
GetTickCount
QueryPerformanceCounter
FileTimeToSystemTime
InterlockedCompareExchange
SetProcessWorkingSetSize
VirtualAlloc
ExitProcess
LeaveCriticalSection
UnhandledExceptionFilter
HeapFree
GetCurrentThreadId
CompareFileTime
GetDateFormatA
WinExec
EnterCriticalSection
SetUnhandledExceptionFilter
TerminateProcess
GetProcAddress
GetCommandLineA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ