Static task
static1
Behavioral task
behavioral1
Sample
a8f7cd2b2d7e0833dba5e7adb6ef690b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a8f7cd2b2d7e0833dba5e7adb6ef690b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a8f7cd2b2d7e0833dba5e7adb6ef690b_JaffaCakes118
-
Size
303KB
-
MD5
a8f7cd2b2d7e0833dba5e7adb6ef690b
-
SHA1
b57b51fe07ff28af45c527e27fa5619fc98a4bcc
-
SHA256
da5f38e0cf370191019d5e5f8f3bb10d1f5ef5b0339b572397b1e6ffb967e491
-
SHA512
970ea542c52d5e31cf6255d189bf518231a0067457d866a7966f281281933054661c0c37a321f124bb92f25d5e58dacddaf014fb42b4d3ed6cf95bda070d78c1
-
SSDEEP
6144:kv+dM1ln2JlcxEkrR7K8scKaQVU6UCFQ+5+siFkdZc98:kv++Xn2AMSQV3UCn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a8f7cd2b2d7e0833dba5e7adb6ef690b_JaffaCakes118
Files
-
a8f7cd2b2d7e0833dba5e7adb6ef690b_JaffaCakes118.exe windows:4 windows x86 arch:x86
7c6780baa026c58d55a35220e90f19be
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
Beep
GetCurrentProcess
GetDiskFreeSpaceExA
GlobalAddAtomW
ExitProcess
CreateDirectoryW
WriteConsoleOutputW
_hread
CancelIo
EnumSystemCodePagesA
OutputDebugStringA
ReadConsoleOutputA
GetHandleInformation
QueryDosDeviceA
WritePrivateProfileStringA
GetOverlappedResult
VirtualUnlock
SetConsoleActiveScreenBuffer
GetStartupInfoA
ReleaseMutex
FreeLibraryAndExitThread
GetLogicalDriveStringsA
VirtualProtect
SetEnvironmentVariableA
CreatePipe
_llseek
SetThreadAffinityMask
ReadConsoleA
LocalFileTimeToFileTime
FindResourceExA
GetWindowsDirectoryA
GetCommandLineA
lstrlenA
VirtualAlloc
GetCPInfo
user32
IsCharAlphaW
CopyRect
SetScrollInfo
TabbedTextOutA
SetDlgItemTextW
CloseClipboard
SetFocus
EndMenu
DialogBoxIndirectParamW
SetMenuItemInfoW
RegisterClipboardFormatA
OemToCharA
CopyIcon
DeferWindowPos
IsRectEmpty
GetMenuDefaultItem
CreateDialogParamW
CharUpperW
CreateDialogIndirectParamW
CreateMenu
EnumClipboardFormats
GetScrollInfo
PostQuitMessage
GetWindowThreadProcessId
RegisterWindowMessageA
LoadIconW
SetWindowTextW
LoadStringW
CreateAcceleratorTableW
IsDialogMessageA
GetTopWindow
RemovePropA
MonitorFromRect
WaitMessage
SetWindowsHookExA
DrawTextW
GetWindowLongA
EmptyClipboard
IsCharLowerA
GetDlgItemInt
IsIconic
DestroyCursor
SendMessageA
TrackMouseEvent
KillTimer
CharNextA
IsCharAlphaA
InvalidateRect
GetClassInfoA
ReleaseCapture
GetWindowTextLengthA
ChangeMenuA
DialogBoxIndirectParamA
GetClipboardViewer
GetFocus
SetCapture
ScrollDC
SetWindowsHookW
gdi32
GetPixelFormat
ModifyWorldTransform
CreatePen
SetPixelV
FillPath
SaveDC
GetRegionData
CreateRectRgnIndirect
GdiFlush
comdlg32
ChooseColorW
advapi32
NotifyChangeEventLog
CryptEncrypt
CryptVerifySignatureW
GetCurrentHwProfileW
CryptGenRandom
RegQueryValueExW
CryptImportKey
RegLoadKeyA
OpenServiceA
RegConnectRegistryW
RegSaveKeyA
SetServiceStatus
CreatePrivateObjectSecurity
AbortSystemShutdownW
CryptGetUserKey
RegLoadKeyW
LookupAccountSidA
CryptHashData
CryptExportKey
LogonUserA
IsValidSid
InitiateSystemShutdownW
ole32
CoCreateInstanceEx
OleSetMenuDescriptor
CoInitializeEx
OleSaveToStream
CoUninitialize
WriteClassStg
CreateStreamOnHGlobal
oleaut32
SysFreeString
SetErrorInfo
shlwapi
PathRemoveBackslashA
PathIsURLW
PathIsRelativeW
PathRelativePathToA
SHDeleteKeyA
Sections
omgii Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
awwkcma Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
eiwga Size: 281KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
yowuo Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ