Static task
static1
Behavioral task
behavioral1
Sample
ac98469777536d1a40345264cd02d384_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ac98469777536d1a40345264cd02d384_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ac98469777536d1a40345264cd02d384_JaffaCakes118
-
Size
41KB
-
MD5
ac98469777536d1a40345264cd02d384
-
SHA1
98711adae48a7134728a4c217be90b3200aef56f
-
SHA256
b2c118238e87bc506add92520878d1fe2d52faab1ed6ebf6456c778a37856a09
-
SHA512
9c56009520ea6b2918ad0980f0fb0f268d36a01c135b5fa85fb27ddc3562efa95f9129717affb0a6c9341c21300cbb363af2458fc96050b77c5e51fa2427b623
-
SSDEEP
768:JPJPCFAvc45eOxOLw8qs+SYqahagE7SIjN/UDR2c:919zf+w8gq8EusNq2c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac98469777536d1a40345264cd02d384_JaffaCakes118
Files
-
ac98469777536d1a40345264cd02d384_JaffaCakes118.exe windows:4 windows x86 arch:x86
ef8083d9017e0ed121f5341a39ec4be8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
keybd_event
UpdateWindow
TranslateMessage
ShowWindow
SetTimer
SetForegroundWindow
SetCursorPos
SendNotifyMessageA
SendMessageA
RegisterClassExA
PostQuitMessage
PeekMessageA
MoveWindow
ModifyMenuA
mouse_event
MapWindowPoints
LoadIconA
LoadCursorA
LoadBitmapA
KillTimer
IsWindowVisible
IsWindowEnabled
IsWindow
InsertMenuItemA
GetWindowRect
GetSystemMenu
GetSubMenu
GetParent
GetMessageA
GetMenuStringA
MessageBoxA
GetMenuItemID
GetMenuItemCount
GetMenu
GetCursorPos
GetClassNameA
EnumWindows
EnumChildWindows
EnableWindow
EnableMenuItem
DrawMenuBar
DispatchMessageA
DefWindowProcA
CreateWindowExA
kernel32
lstrlenA
lstrcpynA
lstrcpyA
lstrcmpA
lstrcatA
WriteProcessMemory
WriteFile
VirtualProtectEx
VirtualFree
VirtualAlloc
TerminateProcess
SystemTimeToFileTime
SetPriorityClass
SetLocalTime
SetFileTime
SetFilePointer
SetFileAttributesA
SetEndOfFile
SetCurrentDirectoryA
RtlMoveMemory
ResumeThread
ReadProcessMemory
ReadFile
LocalUnlock
LocalLock
LocalFree
LocalFileTimeToFileTime
LocalAlloc
GetVersionExA
GetTickCount
GetModuleHandleA
CloseHandle
CopyFileA
CreateFileA
CreateMutexA
CreateProcessA
DeleteFileA
ExitProcess
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCommandLineA
GetCurrentProcess
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetFileTime
GetLastError
GetLocalTime
GetModuleFileNameA
shell32
ShellExecuteExA
gdi32
DeleteObject
advapi32
RegSetValueExA
RegOpenKeyExA
RegOpenKeyA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE