Static task
static1
Behavioral task
behavioral1
Sample
93c5c103a2704012265205bc0f6bb06a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
93c5c103a2704012265205bc0f6bb06a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
93c5c103a2704012265205bc0f6bb06a_JaffaCakes118
-
Size
45KB
-
MD5
93c5c103a2704012265205bc0f6bb06a
-
SHA1
0b5db23f3690bfed186e15a4848e8112320af7ba
-
SHA256
8e16485206c7cd893eff5119ea166e30f562c605fa56d0711298f6a47ca37484
-
SHA512
a96335ac970d0983ab0689bfb4bea1f057e0595833ca00964f3c79bfb0755fc6ff9fcf81a3ed9d34e2270a735fddb1577630f236542dfc5d565390ce63c15576
-
SSDEEP
768:1WlinW/9t2y69quBf2juv9EQtOzIWZd3Ddm6rJDtqDGv5jSj75pchN/pX6+pE:oMWz2fnf99qvJrjPvtCNihhpXbW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 93c5c103a2704012265205bc0f6bb06a_JaffaCakes118
Files
-
93c5c103a2704012265205bc0f6bb06a_JaffaCakes118.exe windows:5 windows x86 arch:x86
c607daf4e6ccae49a00ad11d5d397162
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryW
GetProcAddress
CreateFileW
GetWindowsDirectoryW
lstrcatW
GetWindowsDirectoryA
VirtualAlloc
user32
SetWindowRgn
SetWindowsHookExA
DdeQueryConvInfo
ShowOwnedPopups
ShowWindow
UnhookWindowsHookEx
SetWinEventHook
ValidateRect
VkKeyScanExW
VkKeyScanW
keybd_event
SetShellWindow
SetMenuDefaultItem
DdeSetQualityOfService
SetDeskWallpaper
SetCursorPos
SetClassLongW
SendMessageW
ReplyMessage
RegisterWindowMessageA
RegisterClipboardFormatW
RegisterClassA
RealGetWindowClassA
PaintDesktop
OpenIcon
OpenDesktopW
OemToCharA
NotifyWinEvent
MessageBoxIndirectA
MessageBoxA
MapVirtualKeyW
LookupIconIdFromDirectory
LockWorkStation
LoadStringA
LoadKeyboardLayoutW
LoadCursorFromFileW
IsWindow
IsMenu
InvalidateRect
IMPQueryIMEW
HiliteMenuItem
GetWindowModuleFileName
GetUpdateRect
GetTopWindow
GetSysColor
GetShellWindow
GetQueueStatus
GetPriorityClipboardFormat
GetParent
GetNextDlgTabItem
GetNextDlgGroupItem
GetMenuStringW
GetKeyboardState
GetKeyboardLayout
GetDesktopWindow
GetCursorInfo
GetClientRect
GetClassNameA
GetCaretPos
GetAncestor
FlashWindow
FindWindowW
FindWindowExA
FindWindowA
EnumWindows
EnumPropsExA
EnumDisplaySettingsW
EnumDisplaySettingsA
EnumDisplayDevicesW
DrawMenuBar
DrawFocusRect
DrawCaption
DlgDirSelectExW
DlgDirSelectComboBoxExW
DestroyMenu
DefMDIChildProcA
DefFrameProcW
UnpackDDElParam
DdeNameService
DdeInitializeW
DdeFreeDataHandle
DdeCreateDataHandle
CreateCursor
CountClipboardFormats
CloseWindow
ClipCursor
CheckMenuRadioItem
CharUpperBuffA
CharPrevW
CharLowerW
BringWindowToTop
AttachThreadInput
AdjustWindowRect
SetWindowsHookW
shell32
Shell_NotifyIcon
Shell_NotifyIconA
ShellHookProc
ShellExecuteW
ShellExecuteExA
ShellExecuteEx
ShellExecuteA
ShellAboutW
ShellAboutA
SHQueryRecycleBinW
SHQueryRecycleBinA
CommandLineToArgvW
DoEnvironmentSubstA
DoEnvironmentSubstW
DragAcceptFiles
DragFinish
DragQueryFile
DragQueryFileA
DragQueryFileW
ExtractAssociatedIconA
ExtractIconA
ExtractIconEx
ExtractIconExA
ExtractIconExW
ExtractIconW
FindExecutableA
FindExecutableW
SHAppBarMessage
SHBindToParent
SHBrowseForFolder
SHBrowseForFolderA
SHBrowseForFolderW
SHChangeNotify
SHCreateDirectoryExA
SHCreateDirectoryExW
SHEmptyRecycleBinA
SHEmptyRecycleBinW
SHFileOperation
SHFileOperationW
SHFormatDrive
SHFreeNameMappings
SHGetDataFromIDListA
SHGetDataFromIDListW
SHGetDesktopFolder
SHGetDiskFreeSpaceA
SHGetDiskFreeSpaceExW
SHGetFileInfo
SHGetFolderLocation
SHGetIconOverlayIndexW
SHGetPathFromIDListA
SHGetSettings
SHGetSpecialFolderLocation
SHLoadInProc
SHPathPrepareForWriteW
Shell_NotifyIconW
shlwapi
StrChrW
StrCmpNA
StrCmpNIA
StrCmpNIW
StrCmpNW
StrRChrA
StrRChrIA
StrRChrW
StrRStrIW
StrChrA
comctl32
CreatePropertySheetPageA
ord6
CreateStatusWindowW
DrawStatusText
FlatSB_GetScrollProp
ImageList_Copy
ImageList_DragEnter
InitializeFlatSB
ImageList_SetImageCount
ImageList_Read
ImageList_LoadImageA
ImageList_EndDrag
ImageList_Duplicate
ImageList_DragShowNolock
CreatePropertySheetPage
msvcrt
memcpy
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 728B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1004B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ