Static task
static1
Behavioral task
behavioral1
Sample
8d3cdabe66cdbad54f9748b86877c2f4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8d3cdabe66cdbad54f9748b86877c2f4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8d3cdabe66cdbad54f9748b86877c2f4_JaffaCakes118
-
Size
428KB
-
MD5
8d3cdabe66cdbad54f9748b86877c2f4
-
SHA1
9d18b51aa2cc1e810a7a57df9e1ac80b1cc81aad
-
SHA256
0647d9d3157a9646f345d86adbe706bc5d976da1ba7beb08cafe6c83b7bfcb54
-
SHA512
c061b420782b0ff2c08a5fb389b8e10bdea96e4f99db6ed3604d70aba664d234899700fcc6a467be344ebd2d3fe326726887a271867cde496e73e73181480759
-
SSDEEP
6144:xpHoEZUfjGdnhAcXSAmX3pEICkgc9OOaqnIlza/BTh0UHpnna0dMci8y+zG4/nGG:jjJFhAZAg3iICFc9bnI4/BT3ZmjyD/h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8d3cdabe66cdbad54f9748b86877c2f4_JaffaCakes118
Files
-
8d3cdabe66cdbad54f9748b86877c2f4_JaffaCakes118.exe windows:4 windows x86 arch:x86
24dbd0dcbe24af49e9ccaaa8f557ee48
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CascadeWindows
GetDlgCtrlID
IsWindowVisible
SetWindowPlacement
GetTopWindow
CloseWindow
GetWindowTextLengthA
GetParent
BringWindowToTop
SendDlgItemMessageA
GetSysColor
ole32
StgOpenStorage
CoInstall
CoGetObject
ReadClassStg
OleCreateLinkToFileEx
CLSIDFromString
OleCreateLink
CoUnmarshalInterface
CoIsHandlerConnected
CoTreatAsClass
FmtIdToPropStgName
CoRegisterPSClsid
oledlg
ord6
ord12
ord10
ord3
ord11
ord7
ord4
ord1
ord8
ord2
oleaut32
CreateStdDispatch
advapi32
RegSaveKeyA
RegEnumKeyA
RegLoadKeyA
RegCloseKey
RegDeleteKeyA
RegFlushKey
RegDeleteValueA
RegSetValueExA
RegConnectRegistryA
RegOpenKeyExA
kernel32
GetModuleHandleA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetProcAddress
GetStdHandle
GetFileType
GetCurrentThreadId
TlsSetValue
TlsAlloc
GetStringTypeW
TlsGetValue
GetLastError
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
GetStartupInfoA
GetStringTypeA
SetLastError
RtlUnwind
SetHandleCount
PulseEvent
ReleaseSemaphore
LocalLock
LocalFlags
HeapLock
LocalAlloc
VirtualAllocEx
CreateEventA
GlobalFree
GetOverlappedResult
HeapValidate
GetPrivateProfileIntA
GetPrivateProfileStructA
GetProfileStringA
WritePrivateProfileStructA
WritePrivateProfileStringA
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
HeapReAlloc
VirtualAlloc
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 297KB - Virtual size: 384KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bdmm Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ