Static task
static1
Behavioral task
behavioral1
Sample
a4bef0a10cf5c910cbc2dd45e1072d11_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a4bef0a10cf5c910cbc2dd45e1072d11_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a4bef0a10cf5c910cbc2dd45e1072d11_JaffaCakes118
-
Size
111KB
-
MD5
a4bef0a10cf5c910cbc2dd45e1072d11
-
SHA1
be4bb7b3dfb774d8a071b47877c65008419dc55f
-
SHA256
a159e05016578b623aefd75225b7375ae763e8cb1e5464257e39e9971f4be3f7
-
SHA512
8f6b6e2f6f4d5b434be26fd69544da6024184d60ef8ac6685b7193450ed0397861032e7a7ed5bcddd88a9a2371959f27cf0e876d780798050e9f6a7ae5de6fd3
-
SSDEEP
1536:/Y3lOIc7J6mp2JzNUfUQ+3/6C4Vxex6nWe8zW3dBgJ6mo:/GOdcmpi2fEPKh8a3v86t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4bef0a10cf5c910cbc2dd45e1072d11_JaffaCakes118
Files
-
a4bef0a10cf5c910cbc2dd45e1072d11_JaffaCakes118.exe windows:4 windows x86 arch:x86
f52a72c40acad0a739cf7f92acc318bb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
InitializeCriticalSection
GetFileAttributesA
ReadFile
GlobalDeleteAtom
VirtualAlloc
VirtualAllocEx
lstrcpynA
GetOEMCP
FindFirstFileA
MoveFileExA
GlobalAlloc
ExitThread
LocalFree
GetUserDefaultLCID
GetProcAddress
LoadResource
EnterCriticalSection
VirtualQuery
FormatMessageA
MulDiv
GetACP
WideCharToMultiByte
Sleep
GetVersionExA
version
VerFindFileA
VerQueryValueA
user32
GetActiveWindow
DispatchMessageA
GetSysColor
IsWindow
WaitMessage
ReleaseCapture
RegisterClassA
SetClipboardData
IsDialogMessageW
MessageBeep
GetKeyNameTextA
EnableScrollBar
InvalidateRect
UpdateWindow
InsertMenuItemA
IsWindowUnicode
CharUpperBuffA
GetWindowThreadProcessId
OpenClipboard
MessageBoxA
PtInRect
InflateRect
UnregisterClassA
GetCursor
GetWindow
SendMessageA
EnumChildWindows
DrawAnimatedRects
ClientToScreen
GetDlgItem
GetWindowTextA
GetKeyState
WindowFromPoint
GetFocus
CreateIcon
MoveWindow
GetKeyboardType
DeleteMenu
LoadCursorA
GetTopWindow
EnumThreadWindows
IsChild
DestroyMenu
DestroyWindow
shell32
SHGetDiskFreeSpaceA
SHGetDesktopFolder
gdi32
SetTextColor
GetClipBox
GetDCOrgEx
SetBkMode
Sections
.text Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 419B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 512B - Virtual size: 30B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 154B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ