c:\ff
Static task
static1
Behavioral task
behavioral1
Sample
8e2c53f1c2cc8b021349742fdd12958f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8e2c53f1c2cc8b021349742fdd12958f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8e2c53f1c2cc8b021349742fdd12958f_JaffaCakes118
-
Size
312KB
-
MD5
8e2c53f1c2cc8b021349742fdd12958f
-
SHA1
fb795102654153990254a5bd30f171ab6b270661
-
SHA256
bb1e23c43985b1fd8985826a14342fd7348ab1b4c74283eaa7c8ffabd5ff67f9
-
SHA512
35efe6d641220ad0ffeee736531c91ad023e90b89c441388e8fc00f7b70034422cdc21d53e83d0dc687884091f9aa2e71546eed2eae763e181d3bb3f7c3ab36d
-
SSDEEP
6144:UN9ktTY1b8opjLUfnALUwX8WS0xto/263rtYHkzeirh+O:U7L1jUfShMWSJ/26buHJi8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e2c53f1c2cc8b021349742fdd12958f_JaffaCakes118
Files
-
8e2c53f1c2cc8b021349742fdd12958f_JaffaCakes118.exe windows:4 windows x86 arch:x86
dc71293be48a8bbf48808b4f49c17198
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetMonitorInfoA
MapDialogRect
DefWindowProcA
GetWindowTextLengthA
GetClipCursor
RegisterClassA
MapVirtualKeyA
DdeAccessData
GetSysColor
GetDlgItemTextW
GetMenuStringA
AppendMenuW
RegisterClassExA
MonitorFromRect
GetWindowPlacement
CreateAcceleratorTableW
GetWindowTextLengthW
SetDeskWallpaper
DestroyWindow
GetDlgCtrlID
SubtractRect
PeekMessageA
EnumDesktopsW
GetSysColorBrush
BeginPaint
ShowWindow
DefWindowProcW
BeginDeferWindowPos
CreateWindowExW
MessageBoxW
KillTimer
BlockInput
CreateMDIWindowA
kernel32
GetVersion
lstrcatW
GetStdHandle
WriteFile
QueryPerformanceCounter
WaitForMultipleObjects
GetFileType
GetCurrentProcessId
FlushFileBuffers
UnhandledExceptionFilter
HeapReAlloc
InterlockedExchange
EnumResourceLanguagesA
HeapFree
OpenMutexA
TlsGetValue
FreeEnvironmentStringsA
TlsFree
WritePrivateProfileStructA
SetEnvironmentVariableA
SetLastError
GetCommandLineA
TlsSetValue
CreateNamedPipeA
GetCurrentThreadId
LocalSize
GetSystemTime
GetCurrentThread
GetSystemTimeAsFileTime
GlobalUnlock
FileTimeToDosDateTime
GetCurrentProcess
GetACP
LeaveCriticalSection
GetProcAddress
IsBadWritePtr
GetModuleHandleA
GetStartupInfoA
InterlockedDecrement
GetOEMCP
GetCPInfo
CompareStringA
GetProfileIntA
GetStringTypeA
CreateMutexA
EnterCriticalSection
SetFileAttributesA
GetStringTypeW
WideCharToMultiByte
WriteConsoleA
FreeEnvironmentStringsW
LCMapStringW
VirtualQuery
GetTimeZoneInformation
ReadFile
AddAtomA
VirtualAlloc
DeleteCriticalSection
SetFilePointer
VirtualFree
GetTickCount
GetSystemDirectoryW
FormatMessageA
ExitProcess
SetStdHandle
SetLocaleInfoA
HeapDestroy
InterlockedIncrement
InitializeCriticalSection
EnumSystemLocalesW
RtlUnwind
CloseHandle
GetProfileStringW
GetModuleFileNameA
LCMapStringA
TerminateProcess
GetNamedPipeInfo
HeapCreate
MultiByteToWideChar
WritePrivateProfileStringW
GetLocalTime
CompareStringW
HeapAlloc
TlsAlloc
LoadLibraryA
GetEnvironmentStrings
SetHandleCount
GetLastError
GetEnvironmentStringsW
advapi32
LogonUserA
RegLoadKeyA
CryptDuplicateKey
RegReplaceKeyW
CryptDeriveKey
RegCloseKey
RegSetKeySecurity
RegDeleteValueA
GetUserNameA
InitiateSystemShutdownA
comctl32
ImageList_DragShowNolock
ImageList_DragMove
ImageList_Duplicate
ImageList_SetImageCount
ImageList_Replace
ImageList_DrawIndirect
ImageList_Write
ImageList_Read
ImageList_Draw
ImageList_Remove
InitCommonControlsEx
DrawInsert
InitMUILanguage
ImageList_Copy
CreateStatusWindowW
ImageList_Create
comdlg32
ReplaceTextW
Sections
.text Size: 132KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ