Static task
static1
Behavioral task
behavioral1
Sample
9ffc79b14ccc3a48474d74dc0235cc7f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9ffc79b14ccc3a48474d74dc0235cc7f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9ffc79b14ccc3a48474d74dc0235cc7f_JaffaCakes118
-
Size
580KB
-
MD5
9ffc79b14ccc3a48474d74dc0235cc7f
-
SHA1
f239aacbad668187edd2d4c3d2638cd2c124e267
-
SHA256
facbd5d384f4d5b98069310074c44a4c43023774b7acf8d63a124973a6b2e73d
-
SHA512
f25b7e29fbd81276ebbac67fe67c49b5f5625b5111ec3e8b15d219fc2bcac0e7773ed9ff970aa65a27dc1eab58107cf9d4f880a4c0e3a748e5159326f5c226f5
-
SSDEEP
12288:FHxz7pumKpXR2Ckxpqexw1TIqQ/u7bZELB:FHx3pumKdkC4xw1T8G7U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9ffc79b14ccc3a48474d74dc0235cc7f_JaffaCakes118
Files
-
9ffc79b14ccc3a48474d74dc0235cc7f_JaffaCakes118.exe windows:4 windows x86 arch:x86
0a57cc60287258f4d2d694122009a397
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DebugBreak
EnumSystemCodePagesW
EnumResourceNamesA
CreateNamedPipeW
SetProcessShutdownParameters
GetLargestConsoleWindowSize
SetThreadAffinityMask
SizeofResource
lstrcpyA
OpenSemaphoreW
GetShortPathNameA
FindFirstFileExW
SuspendThread
SetCommMask
GetDiskFreeSpaceExA
GetDriveTypeA
SetProcessAffinityMask
LocalAlloc
ExitProcess
GetDateFormatA
GetFileAttributesA
GetDiskFreeSpaceW
GetProfileIntA
GlobalAddAtomA
GetSystemDefaultLangID
_hread
FreeLibraryAndExitThread
GetCurrentDirectoryW
GetCommConfig
EnumDateFormatsW
GetFileInformationByHandle
GetConsoleCursorInfo
ReadFileScatter
VirtualFree
GetOEMCP
ReadFile
VirtualLock
user32
CopyIcon
UnregisterClassW
SetWindowContextHelpId
CharToOemW
SetPropA
GetWindowLongW
InflateRect
CallWindowProcW
LoadStringA
DispatchMessageW
SetMenu
SetScrollInfo
IsWindowVisible
GetProcessDefaultLayout
CreateDialogIndirectParamA
GrayStringW
GetClipboardViewer
SetWinEventHook
DefFrameProcW
BringWindowToTop
GetWindowRgn
DialogBoxParamW
CloseClipboard
EndPaint
EndDeferWindowPos
GetClientRect
DestroyCursor
NotifyWinEvent
mouse_event
GetKeyboardLayout
GetCaretPos
GetSysColor
UpdateWindow
AttachThreadInput
GetDC
CharLowerBuffW
SetMenuInfo
EndMenu
RegisterWindowMessageW
EnumWindowStationsW
ScrollWindow
GetSubMenu
SetParent
GetMessageW
ShowScrollBar
GetMessageA
SetDlgItemInt
GetInputState
DragDetect
SendMessageA
gdi32
SetMapMode
CreateFontIndirectW
SetPolyFillMode
StretchBlt
EnumFontsW
GetPolyFillMode
CreateRectRgn
advapi32
GetNamedSecurityInfoW
SetSecurityInfo
RegQueryValueExA
ObjectCloseAuditAlarmA
SetPrivateObjectSecurity
MakeAbsoluteSD
shell32
SHGetSpecialFolderPathA
SHGetPathFromIDListA
ExtractIconA
SHLoadInProc
DragQueryPoint
SHBrowseForFolderA
SHGetDesktopFolder
SHFileOperationW
ExtractIconExW
ole32
OleBuildVersion
OleRegGetMiscStatus
oleaut32
SafeArrayCreate
LoadTypeLi
SafeArrayRedim
SysFreeString
SafeArrayPutElement
VariantCopy
SetErrorInfo
VariantChangeType
SafeArrayGetLBound
SafeArrayUnaccessData
comctl32
ImageList_SetBkColor
ImageList_EndDrag
CreatePropertySheetPageW
shlwapi
PathGetArgsW
wnsprintfA
PathCompactPathExW
PathAddExtensionW
SHEnumValueW
PathAddBackslashW
SHRegGetBoolUSValueA
StrToIntExW
StrFormatKBSizeW
HashData
msvcrt
_strnicoll
longjmp
_snwprintf
_spawnlp
_mbsnbicmp
_mbsstr
vfwprintf
iswalpha
system
qsort
ftell
_mbstrlen
_wtol
strcspn
puts
_ultoa
toupper
wcstombs
_open
_finite
Sections
.text Size: 11KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 286KB - Virtual size: 285KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ