Static task
static1
Behavioral task
behavioral1
Sample
8cc8c25f5d368ecb3a8641e25ae891bd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8cc8c25f5d368ecb3a8641e25ae891bd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8cc8c25f5d368ecb3a8641e25ae891bd_JaffaCakes118
-
Size
80KB
-
MD5
8cc8c25f5d368ecb3a8641e25ae891bd
-
SHA1
0f9ca06a0b34806c02fc84ad76da0a40739ccee4
-
SHA256
73e4ba171a50fa410807c60dd6a5db8a9f1a9ee4dce87a02bebb44046ac4da7e
-
SHA512
a8a2eb898592a67cbc2a5fce0e61832382a6533968646866e57954b1ed3c71b77ec7d14201046ab00f716d61dbb150aaa36cf78ba020b25235a599f1c2c47767
-
SSDEEP
1536:Gee35pevOdITCBi3TrnZqPS+P4Ot6yEcUxBsQaxCQ5Q2UFZJ28l6mjWnCR:ec2dXBkTrnZqrHEcGGCYpzo6m3R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8cc8c25f5d368ecb3a8641e25ae891bd_JaffaCakes118
Files
-
8cc8c25f5d368ecb3a8641e25ae891bd_JaffaCakes118.exe windows:5 windows x86 arch:x86
abfd00d646f2350219a83615f9ad1eac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
SetWindowTextA
GetMessageA
GetSubMenu
SetWindowPos
EnumWindows
UnhookWindowsHookEx
GetSysColorBrush
GetSysColor
EqualRect
GetScrollPos
PostQuitMessage
EnableMenuItem
FrameRect
kernel32
GetTimeZoneInformation
VirtualAllocEx
GetOEMCP
InterlockedExchange
GetTickCount
GetCurrentProcessId
ExitProcess
FileTimeToSystemTime
GetThreadLocale
GetStartupInfoA
GetSystemTime
GetFileAttributesA
GetTempPathA
RtlUnwind
SetUnhandledExceptionFilter
gdi32
ExcludeClipRect
CopyEnhMetaFileA
SetViewportExtEx
CreateICW
GetMapMode
DPtoLP
SelectClipPath
CreateCompatibleBitmap
FillRgn
ole32
CoTaskMemRealloc
OleRun
CoCreateInstance
StgOpenStorage
CoInitialize
DoDragDrop
StringFromGUID2
CoInitializeSecurity
CoRevokeClassObject
advapi32
RegCreateKeyA
GetUserNameA
CryptHashData
QueryServiceStatus
FreeSid
CheckTokenMembership
RegCreateKeyExW
GetSecurityDescriptorDacl
RegQueryValueExW
AdjustTokenPrivileges
msvcrt
fprintf
strncpy
_flsbuf
_mbscmp
fflush
signal
puts
strlen
strcspn
iswspace
__setusermatherr
__getmainargs
_CIpow
_lock
raise
_strdup
__initenv
_fdopen
comctl32
ImageList_DrawEx
ImageList_GetIconSize
ImageList_Destroy
CreatePropertySheetPageA
ImageList_SetIconSize
InitCommonControls
ImageList_GetBkColor
ImageList_LoadImageW
ImageList_DragEnter
ImageList_LoadImageA
ImageList_GetIcon
ImageList_Write
ImageList_ReplaceIcon
shell32
CommandLineToArgvW
SHBrowseForFolderA
ExtractIconExW
ShellExecuteW
DragQueryFileA
DragQueryFileW
ShellExecuteEx
DoEnvironmentSubstW
DragAcceptFiles
SHGetPathFromIDList
ExtractIconW
oleaut32
VariantCopy
SysReAllocStringLen
SafeArrayRedim
SafeArrayGetUBound
SafeArrayPutElement
SafeArrayPtrOfIndex
SafeArrayCreate
SafeArrayUnaccessData
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE