Static task
static1
Behavioral task
behavioral1
Sample
b0f7e7fa8e7c23e7b06b68aeb6d8f875_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b0f7e7fa8e7c23e7b06b68aeb6d8f875_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b0f7e7fa8e7c23e7b06b68aeb6d8f875_JaffaCakes118
-
Size
155KB
-
MD5
b0f7e7fa8e7c23e7b06b68aeb6d8f875
-
SHA1
164bd31f6e59ddca914e6fa0e76970f7d81f9ff1
-
SHA256
c94dac5f2966c6661a55dc247b43a5a66091447ffb3a9f9a685af7e338e4c2d7
-
SHA512
019f98ad69b6b4750d91d92621bf51b27e649e74a28179930b10fb9528f6f3dff881cff3baac35b84b49c0310f35197f8911e66b44017297589555063c6f781a
-
SSDEEP
3072:tEswhtcGCQ7y/QuWeZ7QCgFTcqb/3jxjEXMBl7ApIStQyHDuD8n:tpw3cGQLfgBT3jxj79UHS4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b0f7e7fa8e7c23e7b06b68aeb6d8f875_JaffaCakes118
Files
-
b0f7e7fa8e7c23e7b06b68aeb6d8f875_JaffaCakes118.exe windows:5 windows x86 arch:x86
78902464b036f2764cc30790e1d925f0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
AdjustWindowRectEx
SendDlgItemMessageA
TranslateMessage
GetWindowTextLengthW
EnumChildWindows
GetWindowDC
OpenClipboard
InvalidateRect
SystemParametersInfoA
IsWindow
GetClassNameW
GetSystemMenu
CharUpperA
UnhookWindowsHookEx
UnregisterClassW
EqualRect
RegisterWindowMessageW
IntersectRect
DefWindowProcA
FindWindowA
LoadCursorA
SetParent
PeekMessageW
GetSysColor
DrawIconEx
UnregisterClassA
msvcrt
__getmainargs
__p__commode
malloc
time
_wcsicmp
__p__fmode
iswspace
exit
__set_app_type
qsort
isdigit
_adjust_fdiv
calloc
_vsnwprintf
kernel32
RemoveDirectoryW
MapViewOfFile
GetTickCount
FindResourceExW
GetEnvironmentStringsW
GetFullPathNameW
DeleteFileW
GetLocaleInfoW
HeapCreate
VirtualAlloc
InterlockedDecrement
GetTimeZoneInformation
DeleteCriticalSection
MoveFileExW
GetProcessHeap
GetExitCodeProcess
FindResourceW
GetFileInformationByHandle
HeapReAlloc
GetFileAttributesW
GetSystemDefaultLangID
EnterCriticalSection
LoadLibraryA
GetStdHandle
ResumeThread
GetOEMCP
GetDriveTypeW
WideCharToMultiByte
GetThreadLocale
GetCurrentThreadId
lstrcmpiA
GlobalReAlloc
LeaveCriticalSection
GetConsoleOutputCP
HeapAlloc
FindNextFileA
GetStartupInfoA
GetCurrentDirectoryA
GetTempFileNameW
advapi32
RegCreateKeyExA
AdjustTokenPrivileges
SetSecurityDescriptorDacl
RegEnumKeyW
AllocateAndInitializeSid
Sections
.text Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 270KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ