Static task
static1
Behavioral task
behavioral1
Sample
a898efd3204659158034705c278a1aaf_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a898efd3204659158034705c278a1aaf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a898efd3204659158034705c278a1aaf_JaffaCakes118
-
Size
128KB
-
MD5
a898efd3204659158034705c278a1aaf
-
SHA1
e723f80a16885b1f76f154d5f075c8a0148f6fbc
-
SHA256
3155664e3ca665bb7f97eedcb34c82f5cbf2b5c982dfa213bc98e36a9183baa6
-
SHA512
26b9137d25dd50b1707e47d99fce297d093f239615524e3d83fe7b7eea59293fb4fc895ec0321c4210c498186ecc8923dc99eeb8062604a409616cf3b0578b4b
-
SSDEEP
1536:jXMq6zydoIP5u8+DBYGxSVhLJjbimJo6N98piIAaAVhd1Ktqvr+gYEtv9xenvzPF:TMqky2II8qSpVhhxJ/N98Epf+huYPB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a898efd3204659158034705c278a1aaf_JaffaCakes118
Files
-
a898efd3204659158034705c278a1aaf_JaffaCakes118.exe windows:4 windows x86 arch:x86
dd5b14b677ed1f732a2d298c2049df53
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
TrackPopupMenu
ShowWindow
SetWindowTextA
SetWindowRgn
SetWindowPos
SetWindowLongA
UpdateWindow
SetDlgItemTextA
SetClassLongA
SetCapture
SendMessageA
ReleaseCapture
RegisterClassExA
RedrawWindow
SetFocus
PtInRect
OffsetRect
MessageBoxA
LoadIconA
LoadCursorA
LoadBitmapA
IsDlgButtonChecked
InvalidateRect
IntersectRect
GetWindowRect
GetWindowLongA
GetSystemMetrics
GetParent
CloseClipboard
EmptyClipboard
OpenClipboard
SetClipboardData
GetClientRect
MoveWindow
GetKeyState
GetDlgItemTextA
GetDlgItem
GetDlgCtrlID
GetCursorPos
GetCapture
GetActiveWindow
EndDialog
EnableWindow
DrawTextA
DialogBoxParamA
DefWindowProcA
CreateWindowExA
CreatePopupMenu
CheckDlgButton
CallWindowProcA
AppendMenuA
kernel32
FlushFileBuffers
CompareStringA
GetModuleFileNameA
SetCurrentDirectoryA
CreateDirectoryA
GlobalAlloc
GlobalLock
GlobalUnlock
WriteFile
lstrlenA
lstrcpyA
lstrcmpiA
lstrcmpA
lstrcatA
WinExec
WaitForSingleObject
VirtualFree
VirtualAlloc
UnmapViewOfFile
Sleep
SizeofResource
SetFilePointer
SetFileAttributesA
SetEnvironmentVariableA
CloseHandle
CopyFileA
CreateFileA
CreateFileMappingA
CreateProcessA
CreateThread
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
FindResourceA
FreeLibrary
GetCommandLineA
GetCurrentDirectoryA
GetFileAttributesA
GetFileSize
GetModuleHandleA
GetProcAddress
GetTempPathA
LoadLibraryA
LoadResource
MapViewOfFile
MoveFileA
RtlMoveMemory
RtlZeroMemory
SetEndOfFile
shell32
ShellExecuteA
gdi32
GetObjectA
GetStockObject
RoundRect
SelectObject
SetBkColor
CreateFontIndirectA
SetBkMode
CreateSolidBrush
ExtCreateRegion
SetTextColor
comctl32
InitCommonControls
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
comdlg32
GetSaveFileNameA
GetOpenFileNameA
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 121KB - Virtual size: 145KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE