Static task
static1
Behavioral task
behavioral1
Sample
b0ea221ac89975b054dff9b9b2ea2d6c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b0ea221ac89975b054dff9b9b2ea2d6c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b0ea221ac89975b054dff9b9b2ea2d6c_JaffaCakes118
-
Size
389KB
-
MD5
b0ea221ac89975b054dff9b9b2ea2d6c
-
SHA1
b6c9c0027170fc3333859882f1e4b7433fa86c63
-
SHA256
d9d389c28e83e2f2f5be3a9da150b8c4bb4fd697fa6df38e8a7f82f1df68803e
-
SHA512
0d088e59bbc2c8fc2fcdbd5e904b791277fa208858d444562328407510ed3e5bb534ab06fe42678d8e8d164a5eb5875e123ce6a03bf32fba14f28b29f57d0e21
-
SSDEEP
6144:QvvEWpQGVH4UXnI+1gVqNy026il5JGkkNwmqRupvUpZkEmW2uDz8x7:uvJHrnXg6P26ibzmauRSkM2uA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b0ea221ac89975b054dff9b9b2ea2d6c_JaffaCakes118
Files
-
b0ea221ac89975b054dff9b9b2ea2d6c_JaffaCakes118.exe windows:4 windows x86 arch:x86
ea3c8a61d0fb059abcf01d0bb26042dd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
FindTextW
ReplaceTextA
user32
SetWindowsHookA
GetWindowTextA
CreateDialogParamW
DefDlgProcA
DdeGetData
PtInRect
SystemParametersInfoA
ChildWindowFromPointEx
GetSystemMenu
SetPropA
BeginDeferWindowPos
RegisterClassExA
CallMsgFilterA
TranslateAccelerator
CharUpperBuffW
RegisterClassA
SetMenuContextHelpId
InsertMenuA
GetKeyNameTextA
comctl32
InitCommonControlsEx
kernel32
GetThreadContext
InitializeCriticalSection
VirtualAlloc
FindResourceExW
GetConsoleOutputCP
InterlockedExchange
GetLastError
GetEnvironmentStringsW
GetConsoleCP
GetCurrentDirectoryA
VirtualFree
GetStringTypeA
GetLocaleInfoW
VirtualProtect
GetFileAttributesExA
GetStartupInfoA
FreeLibrary
SetUnhandledExceptionFilter
SetConsoleScreenBufferSize
ReadFile
WriteProfileSectionW
SetFilePointer
CompareStringA
GetFullPathNameW
FindFirstFileExW
CreateFileA
QueryPerformanceCounter
IsValidLocale
TlsGetValue
LoadLibraryA
FreeEnvironmentStringsA
HeapFree
InterlockedIncrement
FindFirstFileExA
GetDateFormatA
RtlUnwind
LCMapStringW
TlsSetValue
GetUserDefaultLCID
EnterCriticalSection
Sleep
GetSystemTimeAsFileTime
LCMapStringA
GetStringTypeW
WriteConsoleW
GetOEMCP
HeapReAlloc
GetConsoleMode
GetCurrentThreadId
IsValidCodePage
FlushFileBuffers
GetFileType
IsDebuggerPresent
GetProcAddress
FreeEnvironmentStringsW
MultiByteToWideChar
GetCurrentProcessId
WriteFile
GetACP
DeleteCriticalSection
TerminateProcess
SetConsoleCtrlHandler
VirtualQuery
OpenWaitableTimerW
GetTimeZoneInformation
OpenProcess
HeapSize
GetProcessHeap
CreateMutexA
LeaveCriticalSection
GetLocaleInfoA
EnumSystemLocalesA
TlsAlloc
GetTimeFormatA
GetVersionExA
CompareStringW
GetTickCount
LocalShrink
GetCurrentThread
CreateWaitableTimerA
SetEnvironmentVariableA
GetCommandLineA
SetHandleCount
WriteConsoleA
GetCPInfo
SetStdHandle
HeapDestroy
GetModuleFileNameA
InterlockedDecrement
GetModuleHandleA
GetCurrentProcess
HeapAlloc
OpenMutexA
SetLastError
CloseHandle
ExitProcess
WideCharToMultiByte
GetEnvironmentStrings
GetPrivateProfileStringA
HeapCreate
GetStdHandle
UnhandledExceptionFilter
VirtualFreeEx
TlsFree
Sections
.text Size: 155KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 209KB - Virtual size: 209KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ