Static task
static1
Behavioral task
behavioral1
Sample
a84b4fb01e763482621c5144b92ffe44_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a84b4fb01e763482621c5144b92ffe44_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a84b4fb01e763482621c5144b92ffe44_JaffaCakes118
-
Size
46KB
-
MD5
a84b4fb01e763482621c5144b92ffe44
-
SHA1
9e512bf0c44505b60612b11492df64f34aa7b176
-
SHA256
d641d20379ec4d6983a96437c0ca4851575fec50df1a565c0a7b5a3afaea5535
-
SHA512
5297b92e84aadfa1f2a30f3b72eeecc8182e874230e250d8a867904f031ae5b5ff68b8f178845eacd42c563e72ff515377e8e6d83dcc2a134b013fbb7de75812
-
SSDEEP
768:MQGTdJYwRDcRAiTsGKBj90bZBTgEE3VkZh3xCeUpc4TebtR0yRrBTuWmX/aECme:MvT3DARqrUbZJ2ghcVbeLC5CE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a84b4fb01e763482621c5144b92ffe44_JaffaCakes118
Files
-
a84b4fb01e763482621c5144b92ffe44_JaffaCakes118.exe windows:5 windows x86 arch:x86
82b972e9d08f53001d3215cd23032f59
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetThreadDesktop
GetIconInfo
CharLowerBuffA
GetDlgItemTextA
GetDlgItem
DispatchMessageW
GetKeyboardState
DrawIcon
PeekMessageA
GetClipboardData
FindWindowExW
GetWindowLongW
SendMessageW
ExitWindowsEx
GetForegroundWindow
GetMessageA
LoadCursorW
PeekMessageW
GetDlgItemTextW
GetWindowThreadProcessId
GetMessageW
OpenWindowStationA
CloseWindowStation
GetCursorPos
OpenDesktopA
CloseDesktop
EndDialog
MsgWaitForMultipleObjects
SetProcessWindowStation
GetWindowTextW
GetClassNameW
ToUnicode
GetKeyState
kernel32
HeapAlloc
lstrlenW
FindFirstFileW
GetTempFileNameW
SetEndOfFile
GetLastError
GetTickCount
lstrcpyW
Sleep
SystemTimeToFileTime
GetCommandLineA
DeleteFileW
SetFilePointer
lstrcpynW
GetLocalTime
GetModuleHandleA
lstrcmpiW
CreateProcessW
GetFileSize
ReleaseMutex
LeaveCriticalSection
DisconnectNamedPipe
lstrcatA
WriteProcessMemory
SetLastError
GetComputerNameW
MapViewOfFile
ExpandEnvironmentStringsW
CloseHandle
OpenProcess
GetVersionExW
GetSystemTimeAsFileTime
GetCurrentProcessId
SetFileTime
InitializeCriticalSection
lstrcatW
MultiByteToWideChar
GetTimeZoneInformation
FindClose
GetProcessTimes
GetProcessHeap
GetFileSizeEx
CreateEventW
GetModuleFileNameA
GetExitCodeProcess
ReadFile
CreateDirectoryW
GetCurrentThreadId
GetUserDefaultUILanguage
SetFileAttributesW
GlobalUnlock
HeapFree
GetSystemTime
GetDriveTypeW
GetFileTime
OpenMutexW
GetLogicalDrives
MoveFileExW
Sections
.dcfyv Size: 36KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.faroh Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kzivsd Size: 7KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ