Static task
static1
Behavioral task
behavioral1
Sample
950c7f551809b38073b24579dd0d86c8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
950c7f551809b38073b24579dd0d86c8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
950c7f551809b38073b24579dd0d86c8_JaffaCakes118
-
Size
207KB
-
MD5
950c7f551809b38073b24579dd0d86c8
-
SHA1
24ad48b0fb5a325b0a815d53c12baf75373bcfdc
-
SHA256
c801ba34ccedc6c3b161040f7cfdf46ed30c7b51b41cfb7a398b32a610f970c7
-
SHA512
73879b7de72a97a94e45cf74edad474e2c291b59e4e3a9102cccd84c621acd11732f49e3cf3ab1a91eac1b4c72c74b5f9db429ba05ac4ae478edaf3f4b0a0f04
-
SSDEEP
6144:Y6z8LGramydyw4TV7RgPDGPE4UM0+Kqj8nCpiUC9rL:qGramydyw4BeKPOqj0oiJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 950c7f551809b38073b24579dd0d86c8_JaffaCakes118
Files
-
950c7f551809b38073b24579dd0d86c8_JaffaCakes118.exe windows:4 windows x86 arch:x86
798894f98627989a711e476215797043
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDateFormatW
GetThreadPriority
GetDiskFreeSpaceW
GetProcAddress
IsDebuggerPresent
GetCurrentThread
lstrcatA
CreateEventW
CreateSemaphoreW
GetWindowsDirectoryW
lstrlenA
FileTimeToDosDateTime
GetCurrentDirectoryW
SuspendThread
GetVersion
GetNumberFormatA
GlobalGetAtomNameW
CompareStringW
GetFileAttributesW
GetDiskFreeSpaceA
MoveFileW
OpenWaitableTimerA
GetStringTypeA
CreateFileMappingA
OpenMutexW
CreateThread
GetModuleHandleA
user32
SetCursorPos
CheckMenuItem
SetTimer
IsChild
CreateDialogIndirectParamW
GetDC
LoadBitmapA
DeleteMenu
EnumDesktopsW
RemoveMenu
GetMessageW
MessageBeep
CreateCaret
SetWindowPos
MessageBoxA
BringWindowToTop
DefFrameProcW
GetClassInfoExW
GetDlgItemInt
FindWindowA
DialogBoxParamA
CopyIcon
EnableWindow
ShowCursor
CopyRect
MonitorFromPoint
UpdateWindow
CreateAcceleratorTableW
GetMenuItemInfoA
MessageBoxIndirectA
CharPrevW
CreateWindowExW
LoadIconW
IsDlgButtonChecked
GetWindowTextW
UnregisterClassW
LoadMenuIndirectW
MessageBoxIndirectW
SetForegroundWindow
ArrangeIconicWindows
LoadCursorW
DefWindowProcW
GetClassNameW
EnableMenuItem
CreateWindowExA
gdi32
SelectPalette
CopyEnhMetaFileA
GetEnhMetaFileW
CreateDIBPatternBrushPt
SetDIBColorTable
Polyline
AddFontResourceA
advapi32
RegQueryValueW
RegOpenKeyExA
RegOpenKeyA
shell32
StrChrIW
StrRChrW
SHGetDiskFreeSpaceExA
SHGetDataFromIDListW
ShellExecuteA
ShellExecuteExW
SHCreateDirectoryExA
StrRChrIW
StrRStrA
shlwapi
SHRegWriteUSValueW
PathIsRelativeW
StrCmpNW
PathUndecorateW
SHRegCloseUSKey
UrlCanonicalizeW
PathMakePrettyA
ColorHLSToRGB
AssocQueryKeyW
SHCopyKeyA
setupapi
SetupRemoveSectionFromDiskSpaceListA
pSetupGetQueueFlags
SetupGetInfFileListA
SetupDiEnumDriverInfoW
CM_Enumerate_EnumeratorsW
CM_Intersect_Range_List
SetupInstallServicesFromInfSectionA
SetupOpenInfFileW
inetcomm
MimeOleSMimeCapRelease
EssMLHistoryDecodeEx
HrGetLastOpenFileDirectory
HrSaveAttachToFile
MimeOleStripHeaders
MimeOleParseRfc822AddressW
MimeOleGetPropW
Sections
.jvHreF Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.EM Size: 512B - Virtual size: 391KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sY Size: 3KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.VDqhQ Size: 3KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.REvSwR Size: 2KB - Virtual size: 482KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 103KB - Virtual size: 440KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.c Size: 1024B - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 858B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ