Static task
static1
Behavioral task
behavioral1
Sample
a8e8d3a02f6844dba4acc316eb3cc97e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a8e8d3a02f6844dba4acc316eb3cc97e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a8e8d3a02f6844dba4acc316eb3cc97e_JaffaCakes118
-
Size
192KB
-
MD5
a8e8d3a02f6844dba4acc316eb3cc97e
-
SHA1
a69e8838cd441f7b18c95012e5cbf7eb0a348569
-
SHA256
86d06cdcd7419144a6394b4518b5288980d90914426a9c3e40f587b9d11052fc
-
SHA512
5bd7354936ff8bdabfdf8b7f268c17e70da5dda8f09d3daeac636555c40c1d9f85578ce880f563e0d251fb414f1d8609f8243d55e77ce5a893fe37fcc6c40fc0
-
SSDEEP
3072:Io+DYGfuSjaHVKEL4GFlFahIM4PGvmk05lXr+0DyU5PTm9FF+Kb:BjuKWSNp005VUbjN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a8e8d3a02f6844dba4acc316eb3cc97e_JaffaCakes118
Files
-
a8e8d3a02f6844dba4acc316eb3cc97e_JaffaCakes118.exe windows:4 windows x86 arch:x86
bd2d731eb2a446fe281aba5a9e5b72dd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
Shell_NotifyIconA
SHGetDiskFreeSpaceA
user32
GetMenuState
EnumThreadWindows
GetKeyNameTextA
CallNextHookEx
GetScrollPos
PostQuitMessage
GetClassInfoA
RegisterWindowMessageA
MessageBoxA
GetClientRect
GetWindowTextA
IsDialogMessageW
OemToCharA
DrawIcon
IsWindow
SetWindowTextA
DestroyMenu
IsRectEmpty
IsZoomed
DestroyCursor
SystemParametersInfoA
GetKeyboardType
ShowScrollBar
DrawFrameControl
GetDlgItem
GetKeyboardLayoutNameA
GetSubMenu
GetParent
SetWindowLongA
DispatchMessageA
SendMessageW
IsWindowEnabled
GetWindowDC
GetMenuItemInfoA
GetWindowPlacement
MsgWaitForMultipleObjects
SetParent
GetKeyboardLayoutList
ActivateKeyboardLayout
IsWindowVisible
InflateRect
SendMessageA
FillRect
GetWindow
LoadKeyboardLayoutA
MapWindowPoints
IsDialogMessageA
GetClipboardData
ReleaseCapture
GetMenu
FindWindowA
SetScrollPos
GetFocus
RemovePropA
GetIconInfo
GetWindowLongA
OpenClipboard
DrawEdge
DeleteMenu
SetMenu
LoadCursorA
SetScrollRange
InsertMenuItemA
GetTopWindow
CharUpperBuffA
IsWindowUnicode
EnableMenuItem
InsertMenuA
GetWindowRect
GetWindowThreadProcessId
CreateIcon
SetWindowPos
GetScrollInfo
GetLastActivePopup
GetSysColor
IsChild
GetForegroundWindow
DefWindowProcA
PeekMessageW
ShowOwnedPopups
RegisterClipboardFormatA
CloseClipboard
SetCursor
MoveWindow
GetWindowLongW
InvalidateRect
SetTimer
UnregisterClassA
SetWindowPlacement
ShowWindow
CharLowerA
ScrollWindow
OffsetRect
ScreenToClient
IntersectRect
DefFrameProcA
MapVirtualKeyA
DestroyWindow
ClientToScreen
DrawIconEx
SetMenuItemInfoA
LoadIconA
EnumChildWindows
PostMessageA
GetMessagePos
DispatchMessageW
GetDesktopWindow
UnhookWindowsHookEx
DestroyIcon
WindowFromPoint
GetClassNameA
SetForegroundWindow
CharNextA
GetDCEx
CreatePopupMenu
PtInRect
GetKeyState
KillTimer
GetPropA
wsprintfA
RedrawWindow
GetScrollRange
DrawMenuBar
GetSysColorBrush
GetCapture
EnableScrollBar
CharLowerBuffA
kernel32
lstrlenW
GetLastError
GetModuleHandleA
LoadLibraryA
GetModuleHandleW
ExitProcess
IsBadReadPtr
GetOEMCP
VirtualAllocEx
LoadLibraryExA
GetProcAddress
GetCommandLineA
lstrlenA
ExitThread
GetVersionExA
gdi32
CreateCompatibleBitmap
SetPixel
BitBlt
GetCurrentPositionEx
Sections
CODE Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 482B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ddata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ