Static task
static1
Behavioral task
behavioral1
Sample
a4ebcc415db799694801775664497258_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a4ebcc415db799694801775664497258_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a4ebcc415db799694801775664497258_JaffaCakes118
-
Size
115KB
-
MD5
a4ebcc415db799694801775664497258
-
SHA1
222e0e19d2e55e17ac1e7df41a2232008628724f
-
SHA256
8422de99fd9a3e789c18ca15c2e7ad4e4095f8d0578c79538bd2aee3795183a0
-
SHA512
a2761a4d1439d4b583c636281519babf6e7f9be877b7ae944bdb83cfe65a731e46d9909d375296dcb332da484a3c837f4b9fd9d2552dbb53ed808e0ee82047cf
-
SSDEEP
3072:rvkGO9TMGNG0WycxnvdwOxQZbGL6msFhx2DmWKA2:TkGmMGky+iO+GCh0D8z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4ebcc415db799694801775664497258_JaffaCakes118
Files
-
a4ebcc415db799694801775664497258_JaffaCakes118.exe windows:4 windows x86 arch:x86
df16d0d50d9f0595e8777c3d17b69923
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHFileOperationA
SHGetFolderPathA
Shell_NotifyIconA
user32
FrameRect
DrawIcon
MapVirtualKeyA
AdjustWindowRectEx
RemoveMenu
MapWindowPoints
SetScrollPos
GetSystemMenu
GetDC
GetMenuItemInfoA
DefWindowProcA
PostQuitMessage
IsWindowEnabled
MsgWaitForMultipleObjects
GetCursorPos
EqualRect
IsRectEmpty
GetSysColorBrush
GetSystemMetrics
GetSubMenu
InflateRect
GetTopWindow
GetKeyboardLayout
GetSysColor
GetFocus
RemovePropA
RegisterClassA
OffsetRect
ScreenToClient
CharLowerBuffA
SetFocus
DrawEdge
ShowScrollBar
UnhookWindowsHookEx
GetMenu
CallNextHookEx
GetActiveWindow
GetKeyState
PostMessageA
CreateMenu
DestroyWindow
IsWindowVisible
RegisterWindowMessageA
GetMessagePos
InvalidateRect
DrawTextA
UnregisterClassA
PeekMessageA
SetParent
GetWindowLongW
InsertMenuItemA
GetWindowPlacement
GetWindowDC
SetCapture
GetKeyboardLayoutNameA
OpenClipboard
DrawAnimatedRects
DrawMenuBar
LoadBitmapA
ShowWindow
GetClassLongA
EnumWindows
GetLastActivePopup
IsIconic
InsertMenuA
GetScrollPos
IsDialogMessageW
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
gdi32
BitBlt
SetBkColor
CopyEnhMetaFileA
LineTo
GetPaletteEntries
CreateBrushIndirect
GetRgnBox
SetBkMode
GetBitmapBits
SetPixel
kernel32
lstrcmpA
GetFullPathNameA
GetVersionExA
DeleteFileA
GetProcessHeap
ReadFile
CloseHandle
GetLocalTime
ExitThread
CreateThread
GetStringTypeW
LocalFree
VirtualAllocEx
GetProcAddress
LocalAlloc
GetFileType
GetModuleHandleA
VirtualAlloc
GetFileAttributesA
RaiseException
GlobalAlloc
GetCurrentProcess
GetLocaleInfoA
Sections
.text Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 734B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 731B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ