Static task
static1
Behavioral task
behavioral1
Sample
8d0a9e4e0de1a9d690c0b3b24c699c73_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8d0a9e4e0de1a9d690c0b3b24c699c73_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8d0a9e4e0de1a9d690c0b3b24c699c73_JaffaCakes118
-
Size
143KB
-
MD5
8d0a9e4e0de1a9d690c0b3b24c699c73
-
SHA1
a32098dc3fec692edc7467e43a456f715e9b16e1
-
SHA256
5453e8aebfa1d57ac3be6088c1d63c22edb86590ee36fff2a54a780afbaa9952
-
SHA512
1f6adfaf97855ee5d3f2f0845a6af1015ff14c30ae50b94ef1b7962f0554901b8a00e6708e26fe3b412d356603d8997d14b1d9e829ecfc4fa8ae421daadacf9e
-
SSDEEP
3072:8G9zyRlyGQaxNuTwE5LwkOmySuvorxxkvg1VvxtXa0CZ9jS:8GxclyGMsEPLySqIxrxg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8d0a9e4e0de1a9d690c0b3b24c699c73_JaffaCakes118
Files
-
8d0a9e4e0de1a9d690c0b3b24c699c73_JaffaCakes118.exe windows:5 windows x86 arch:x86
faaf52c018e15192fed04849ee53821b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetROP2
SetPixelV
GetBrushOrgEx
CreatePalette
UnrealizeObject
SetDIBColorTable
GetEnhMetaFilePaletteEntries
TextOutA
SetWindowOrgEx
CreateRectRgnIndirect
ExtTextOutA
SetDIBits
ExtCreateRegion
CreateCompatibleBitmap
GetEnhMetaFileDescriptionA
GdiFlush
CreateHalftonePalette
RoundRect
SaveDC
GetWindowOrgEx
SetBrushOrgEx
DeleteObject
CreatePen
EnumFontsA
CreateEnhMetaFileA
ole32
CreateStreamOnHGlobal
CreateDataAdviseHolder
IsEqualGUID
RegisterDragDrop
OleInitialize
OleSetMenuDescriptor
DoDragDrop
user32
IsDialogMessageA
DrawMenuBar
GetDlgItem
GetMenuItemInfoW
ScrollDC
RegisterWindowMessageA
DrawFocusRect
MapVirtualKeyW
GetWindow
CreateWindowExA
RegisterClassW
GetWindowLongW
CharUpperBuffA
WinHelpA
CreatePopupMenu
ReleaseCapture
NotifyWinEvent
GetDesktopWindow
GetWindowThreadProcessId
LockWindowUpdate
GetClassInfoA
SendMessageW
SendDlgItemMessageA
IsClipboardFormatAvailable
GetClipboardFormatNameA
CharLowerBuffW
PostThreadMessageA
WaitMessage
GetKeyboardType
ChildWindowFromPoint
UnregisterClassW
GetParent
GetScrollPos
GetClassNameA
ClientToScreen
RemoveMenu
ClipCursor
ReuseDDElParam
CharUpperBuffW
GetMenu
GetCursorPos
kernel32
HeapFree
CreateMutexA
GetProcessHeap
FlushFileBuffers
WaitForMultipleObjects
GetFileAttributesA
TerminateProcess
GetFileAttributesW
lstrcpynA
GetStartupInfoA
VirtualQuery
QueryPerformanceFrequency
GetComputerNameExA
RtlUnwind
LocalFree
CloseHandle
GetModuleHandleA
TerminateProcess
TerminateThread
GetCommandLineA
GetModuleHandleA
LeaveCriticalSection
lstrlenW
CopyFileA
UnmapViewOfFile
SetEndOfFile
CompareStringW
ReleaseMutex
HeapAlloc
CreateFileMappingA
GetVolumeInformationA
GlobalFree
MapViewOfFileEx
LocalAlloc
mdmicirt
_FEps
_LDscale
_LSnan
_LSinh
_Mbrtowc
_FCosh
_FNan
_Tolower
comctl32
ImageList_Destroy
ImageList_Create
ImageList_Draw
ImageList_EndDrag
wininet
InternetOpenA
advapi32
InitializeSecurityDescriptor
GetUserNameA
RegQueryValueExA
RegFlushKey
shell32
DragAcceptFiles
imm32
ImmGetCompositionStringA
oleaut32
VariantCopyInd
SafeArrayAccessData
Sections
.text Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ