Static task
static1
Behavioral task
behavioral1
Sample
a14f7ca53fb8828dc193bb368277de66_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a14f7ca53fb8828dc193bb368277de66_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a14f7ca53fb8828dc193bb368277de66_JaffaCakes118
-
Size
70KB
-
MD5
a14f7ca53fb8828dc193bb368277de66
-
SHA1
740612f246474990073ddca01c0274151ee9818c
-
SHA256
ed470dd049a3b8556ecbbe51070ea787dac637681c7db98c624bf221f88e3ae8
-
SHA512
48b07ca3b393d005f84a03e8acf9ceeecefc3652e1a15fa05f961a5c2103740a6d79489d67cf543863864b6dc6ef33675248861d9e6dcab6f4ba5a1fe5a1504c
-
SSDEEP
768:cX3M0qlhQv2m42pYadAvk+vsvqi41NOuSHKFqQ:cHHqlhQvx3pYaGU7uMH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a14f7ca53fb8828dc193bb368277de66_JaffaCakes118
Files
-
a14f7ca53fb8828dc193bb368277de66_JaffaCakes118.exe windows:4 windows x86 arch:x86
9edddb36e3ab5f53d4ca166c2ccefd1b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
strlen
strcpy
strcat
memcpy
fclose
fopen
fseek
sprintf
strcmp
strncmp
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
InitializeCriticalSection
GetCurrentProcess
DuplicateHandle
CloseHandle
CreatePipe
GetStdHandle
HeapAlloc
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
HeapFree
GlobalAlloc
GlobalFree
HeapReAlloc
user32
DestroyIcon
CreateIconFromResourceEx
CreateIconFromResource
GetIconInfo
GetSysColor
GetSysColorBrush
CreateWindowExA
SendMessageA
GetWindowLongA
SetWindowTextA
GetWindow
SetWindowLongA
IsWindowEnabled
PostMessageA
CallWindowProcA
GetWindowRect
ScreenToClient
RedrawWindow
SetWindowPos
InvalidateRect
UpdateWindow
ReleaseCapture
BeginPaint
DrawStateA
EndPaint
SetCapture
GetSystemMetrics
GetWindowTextLengthA
GetWindowTextA
DestroyWindow
RemovePropA
DefWindowProcA
SetPropA
GetParent
GetPropA
SetActiveWindow
UnregisterClassA
DestroyAcceleratorTable
LoadIconA
LoadCursorA
RegisterClassA
AdjustWindowRect
GetActiveWindow
ShowWindow
CreateAcceleratorTableA
PeekMessageA
MsgWaitForMultipleObjects
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
SetCursorPos
LoadImageA
SetCursor
MapWindowPoints
MoveWindow
SystemParametersInfoA
GetKeyState
GetCursorPos
GetClientRect
FillRect
EnumChildWindows
DefFrameProcA
IsWindowVisible
SetFocus
GetFocus
IsChild
GetClassNameA
gdi32
GetObjectType
DeleteObject
CreateCompatibleDC
SetDIBits
DeleteDC
GetObjectA
CreateDCA
CreateCompatibleBitmap
CreateDIBSection
GetStockObject
SetBkColor
SetTextColor
CreateSolidBrush
comctl32
InitCommonControlsEx
shell32
ShellExecuteExA
ole32
RevokeDragDrop
Sections
.code Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 177B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ