Static task
static1
Behavioral task
behavioral1
Sample
abe896092a62239547d86510d02e62d1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
abe896092a62239547d86510d02e62d1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
abe896092a62239547d86510d02e62d1_JaffaCakes118
-
Size
416KB
-
MD5
abe896092a62239547d86510d02e62d1
-
SHA1
c45953e2fc5740f1d41ebe235f613a884168458f
-
SHA256
97d46e7749849de733cb373ade0b88ad66645d28ffe4d43bc5726de5f00bfc1e
-
SHA512
db3e7d2440bb6634bef43d80b6dd5713fa1cae5a11e9f7465ede7c506209efb89bf3cd732079a14bc50ae2718c28e8c256b56ba6bd1c68190e3dd0f5bf1e5ab4
-
SSDEEP
3072:h1vq8hjeZNuOozw3inmru6tdcIgTaOhkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkt:PyZtfFn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource abe896092a62239547d86510d02e62d1_JaffaCakes118
Files
-
abe896092a62239547d86510d02e62d1_JaffaCakes118.exe windows:4 windows x86 arch:x86
d125cbfd58b5d667bfdda48f6d313795
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetSystemMetrics
wsprintfA
MessageBoxA
CreateIconFromResource
SetWindowRgn
CreateWindowExA
SetWindowPos
PostThreadMessageA
UnhookWindowsHookEx
SetWindowsHookExA
GetWindowThreadProcessId
IsWindow
CallNextHookEx
FillRect
GetSysColor
GetDC
TrackMouseEvent
GetParent
InvalidateRect
MoveWindow
GetClassInfoExA
PostQuitMessage
CallWindowProcA
ReleaseCapture
EndPaint
TranslateMessage
DispatchMessageA
ReleaseDC
DrawTextA
DrawIconEx
SendMessageA
BeginPaint
GetWindowDC
GetWindowRect
GetWindowTextA
DefWindowProcA
RegisterClassExA
LoadCursorA
LoadIconA
ShowWindow
WaitForInputIdle
GetMessageA
kernel32
GlobalFree
MulDiv
CreateThread
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SuspendThread
ResumeThread
GetExitCodeThread
TerminateThread
GetCurrentThreadId
GetProcessHeap
ExitProcess
HeapAlloc
GlobalLock
GlobalUnlock
LCMapStringA
GetTickCount
SetFilePointer
ReadFile
CreateFileA
WriteFile
GetModuleFileNameA
IsBadReadPtr
HeapFree
CreateFileMappingA
MapViewOfFile
RtlMoveMemory
lstrcpyn
CreateProcessA
WaitForSingleObject
CloseHandle
LoadLibraryA
GetCurrentDirectoryA
LocalAlloc
RtlFillMemory
LocalFree
LocalSize
GetModuleHandleA
GetProcAddress
FreeLibrary
GlobalAlloc
HeapReAlloc
gdi32
CreateCompatibleDC
SelectObject
SetBkMode
SetTextColor
CreateFontA
BitBlt
DeleteObject
DeleteDC
StretchBlt
GetObjectA
CreateSolidBrush
CreateDCA
GetDeviceCaps
CreateRoundRectRgn
CreateCompatibleBitmap
ole32
CreateStreamOnHGlobal
olepro32
ord251
msvcrt
_ftol
??2@YAPAXI@Z
free
strncpy
realloc
malloc
sprintf
srand
rand
strtod
??3@YAXPAX@Z
modf
shlwapi
PathFileExistsA
Sections
.text Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 344KB - Virtual size: 343KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE