Static task
static1
Behavioral task
behavioral1
Sample
a53ceb7e20049cf33b97864455fdf84c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a53ceb7e20049cf33b97864455fdf84c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a53ceb7e20049cf33b97864455fdf84c_JaffaCakes118
-
Size
1.5MB
-
MD5
a53ceb7e20049cf33b97864455fdf84c
-
SHA1
24271ff4b214d0954a05d2cbb20dc01fd14ea26c
-
SHA256
08bdcc00a907c3b3727fe17969bf14e1fe8e88c44b33f5e1f3a4e5490500e844
-
SHA512
4933b8e2e5d1f4e9e02dfe2bdecc2770adcfdeb4ccfc934cf00f2c2c318df32953855ee207e2aca617892c5389a4d81cce9678ce37307d06d020a54850a1120b
-
SSDEEP
24576:GLNwY9kjEHdtqg8kCO3mkzRs++20WNEdkpBUHpbOf010YvP5P5:GNB6jMdtbPeNG01Z3F5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a53ceb7e20049cf33b97864455fdf84c_JaffaCakes118
Files
-
a53ceb7e20049cf33b97864455fdf84c_JaffaCakes118.exe windows:4 windows x86 arch:x86
d899e41b0dd947b24f81e407a13213b6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
strncpy
strlen
strcpy
strcat
memcmp
_stricmp
memcpy
fclose
fopen
fseek
sprintf
strcmp
strncmp
memmove
kernel32
GetModuleHandleA
HeapCreate
CreateMutexA
GetLastError
CloseHandle
GlobalAddAtomA
HeapDestroy
ExitProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
GetProcAddress
GetCurrentProcess
WaitForSingleObject
VirtualFreeEx
HeapFree
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetVersionExA
LoadLibraryA
DeleteCriticalSection
CreateThread
Sleep
GetCurrentThreadId
GetCurrentProcessId
GetModuleFileNameA
CreateFileA
SetFilePointer
SetEndOfFile
WriteFile
GetFileSize
ReadFile
GetTickCount
FreeLibrary
GlobalAlloc
GlobalFree
CreateDirectoryA
GetDriveTypeA
FindFirstFileA
FindClose
GetFileAttributesA
GetCurrentDirectoryA
MoveFileA
DeleteFileA
FindNextFileA
WaitForMultipleObjects
HeapReAlloc
ResetEvent
SetEvent
TlsGetValue
TlsSetValue
GetCurrentThread
DuplicateHandle
TlsAlloc
CreateEventA
comctl32
InitCommonControls
InitCommonControlsEx
user32
RegisterHotKey
FindWindowA
GetParent
GetWindowThreadProcessId
GetWindowTextA
GetWindow
ShowWindowAsync
EnableWindow
DefWindowProcA
DestroyWindow
GetWindowLongA
GetWindowTextLengthA
UnregisterClassA
LoadCursorA
RegisterClassExA
IsWindowEnabled
GetSystemMetrics
CreateWindowExA
SetWindowLongA
SendMessageA
SetFocus
CreateAcceleratorTableA
SetForegroundWindow
BringWindowToTop
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
DestroyAcceleratorTable
MessageBoxA
IsWindowVisible
GetForegroundWindow
EnumWindows
SetMenu
DestroyMenu
GetMenuItemInfoA
SetMenuItemInfoA
GetCursorPos
ModifyMenuA
CreatePopupMenu
AppendMenuA
TrackPopupMenu
DestroyIcon
CreateIconFromResourceEx
CreateIconFromResource
GetIconInfo
SetWindowTextA
GetSysColor
GetSysColorBrush
CallWindowProcA
RemovePropA
SetPropA
GetPropA
RedrawWindow
SetActiveWindow
LoadIconA
PeekMessageA
MsgWaitForMultipleObjects
GetActiveWindow
RegisterClassA
AdjustWindowRect
GetWindowRect
ShowWindow
IsZoomed
IsIconic
SetCursorPos
LoadImageA
SetCursor
MapWindowPoints
MoveWindow
SystemParametersInfoA
GetKeyState
SetCapture
PostMessageA
ReleaseCapture
GetFocus
IsChild
GetClassNameA
EnumChildWindows
GetClientRect
FillRect
DefFrameProcA
gdi32
GetStockObject
GetObjectType
DeleteObject
CreateCompatibleDC
SetDIBits
DeleteDC
GetObjectA
CreateDCA
CreateCompatibleBitmap
CreateDIBSection
SetBkColor
SetTextColor
CreateSolidBrush
comdlg32
GetSaveFileNameA
GetOpenFileNameA
shell32
Shell_NotifyIconA
ole32
CoInitialize
RevokeDragDrop
Sections
.code Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 320B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ