Static task
static1
Behavioral task
behavioral1
Sample
8cf1e0e98a286229a63e5acaaf93fe3d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8cf1e0e98a286229a63e5acaaf93fe3d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8cf1e0e98a286229a63e5acaaf93fe3d_JaffaCakes118
-
Size
80KB
-
MD5
8cf1e0e98a286229a63e5acaaf93fe3d
-
SHA1
1916602925d16cf0e2addea090336eb2fd02de37
-
SHA256
6c2a2bbca7535cdde7d59bd18f530c7f758bf8b8174852f9c87505c249ecedfd
-
SHA512
b9aa906d031222a746107ff3d224f48f4c8a42f27549ed336c55edfbebf5683547c6a97c4205ec0ead461cffaff0477257c3a527905fa163b918967943b1a48a
-
SSDEEP
1536:X7d44eFtvHLfQE4ieCQ9sZV044EqEWH+ufB+cU+kxL/8O0vAkIfxqhCgz:LdFoHF4QF6F5R9B+n+w/3qAkZh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8cf1e0e98a286229a63e5acaaf93fe3d_JaffaCakes118
Files
-
8cf1e0e98a286229a63e5acaaf93fe3d_JaffaCakes118.exe windows:4 windows x86 arch:x86
f07ea2e622a760eedd1c63c0f79d6c9c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DefWindowProcA
GetCursor
GetKeyNameTextA
GetForegroundWindow
GetDC
GetIconInfo
CallWindowProcA
HideCaret
FillRect
TrackPopupMenu
EndPaint
CharLowerA
GetClientRect
GetDesktopWindow
GetLastActivePopup
SetWindowPos
GetDlgItem
GetScrollRange
GetClassInfoA
GetWindowTextA
GetDCEx
IsMenu
GetFocus
GetCursorPos
GetActiveWindow
CreateWindowExA
GetClipboardData
GetCapture
GetClassLongA
GetScrollPos
GetMessagePos
ole32
MkParseDisplayName
CoCreateGuid
GetHGlobalFromStream
CoDisconnectObject
CoReleaseMarshalData
CLSIDFromProgID
advapi32
RegDeleteKeyA
version
VerQueryValueA
comctl32
ImageList_DragShowNolock
ImageList_Remove
ImageList_Add
ImageList_Draw
kernel32
lstrcpyA
DeleteCriticalSection
SetFilePointer
WideCharToMultiByte
GetFileSize
GetSystemDefaultLangID
GetLastError
WriteFile
GetLocaleInfoA
HeapAlloc
LoadLibraryA
LockResource
GetACP
SetThreadLocale
LocalReAlloc
LoadLibraryExA
MoveFileA
GetCurrentProcess
ExitProcess
FindResourceA
SetEndOfFile
WaitForSingleObject
lstrcmpiA
GetFullPathNameA
ExitThread
HeapDestroy
HeapFree
GetVersionExA
FreeLibrary
GetLocalTime
VirtualAllocEx
GlobalAlloc
SetErrorMode
FreeResource
LocalAlloc
VirtualFree
GetCPInfo
GetVersion
GetProcAddress
ResetEvent
GetStringTypeA
SizeofResource
SetLastError
GetModuleHandleA
CreateFileA
lstrcatA
GlobalAddAtomA
VirtualAlloc
GetCurrentThread
GetThreadLocale
lstrlenA
GetUserDefaultLCID
GetDateFormatA
DeleteFileA
EnumCalendarInfoA
Sleep
GetFileType
GetCurrentProcessId
GetOEMCP
GetTickCount
RaiseException
InitializeCriticalSection
GetCommandLineA
MulDiv
GetStartupInfoA
shell32
Shell_NotifyIconA
DragQueryFileA
SHGetDiskFreeSpaceA
SHGetSpecialFolderLocation
SHGetFileInfoA
msvcrt
malloc
memmove
acos
strcmp
Sections
CODE Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ