Static task
static1
Behavioral task
behavioral1
Sample
b11492d7d8ee2c01e83973cc7be278c1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b11492d7d8ee2c01e83973cc7be278c1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b11492d7d8ee2c01e83973cc7be278c1_JaffaCakes118
-
Size
256KB
-
MD5
b11492d7d8ee2c01e83973cc7be278c1
-
SHA1
5681799cf0f0d59bd5bbb2faa55d72e99978b53a
-
SHA256
d8aa593b2168985cd18e1d263ac394fcc5f43509e8070e86a021b8481914ffa4
-
SHA512
7349a6f818c4dece38c6d0df9b08824dd1d35f5b7018cf14a62ba5244034a97115a7fb52ec89bd3f4fe84af7a6263a04434b089c408c48139a22e73d36d74626
-
SSDEEP
3072:Ts7SAkbd52fBtYc3l4T23neVjKjFuzhr3HV3ywdT:w7EmYcOTaeVjKjFUhRC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b11492d7d8ee2c01e83973cc7be278c1_JaffaCakes118
Files
-
b11492d7d8ee2c01e83973cc7be278c1_JaffaCakes118.exe windows:4 windows x86 arch:x86
f147660a9768668e823c6762b79d6951
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetDefaultCommConfigA
GetModuleHandleA
GetCurrentThread
WriteConsoleOutputA
EnumSystemCodePagesA
UnregisterWait
EnumResourceTypesA
GetConsoleCursorInfo
GetConsoleTitleA
GetCommTimeouts
ReadConsoleInputA
GetSystemTimes
OpenJobObjectA
WriteProfileStringA
GetSystemWindowsDirectoryA
ReadConsoleA
FreeResource
HeapAlloc
GetUserDefaultLCID
CreateWaitableTimerA
GetNumberOfConsoleFonts
GetCommandLineA
HeapSize
SizeofResource
SetConsoleFont
GetCurrentProcessId
MoveFileWithProgressA
GetProfileStringA
GetCPInfoExA
GetShortPathNameA
GetCurrencyFormatA
HeapSetInformation
GetVersionExA
ReadConsoleInputA
GetVolumeInformationA
GetProcessVersion
Toolhelp32ReadProcessMemory
ExpandEnvironmentStringsA
WriteConsoleOutputCharacterA
MoveFileExA
GetConsoleScreenBufferInfo
GetCurrentDirectoryA
SearchPathA
GetSystemDefaultLCID
GetProcessId
SetComputerNameExA
SetThreadAffinityMask
GetLogicalDrives
GlobalFindAtomA
SetFilePointer
WriteConsoleOutputCharacterA
OutputDebugStringA
VirtualAllocEx
ProcessIdToSessionId
HeapReAlloc
GlobalDeleteAtom
SetMessageWaitingIndicator
GetThreadSelectorEntry
FlushViewOfFile
GetEnvironmentVariableA
CompareStringA
TransmitCommChar
OpenProcess
GetTimeFormatA
lstrcmp
IsBadReadPtr
IsBadWritePtr
GetTempFileNameA
CopyFileA
SystemTimeToFileTime
GetCurrentProcess
WaitForSingleObject
GetLocaleInfoA
WriteConsoleOutputAttribute
GetComputerNameExA
GetDllDirectoryA
GetCommMask
CopyFileExW
ClearCommError
GetLocalTime
OpenEventA
OpenSemaphoreA
GetCurrentDirectoryA
GetFullPathNameA
CompareStringA
GetLocalTime
GetCommProperties
QueueUserWorkItem
LocalFileTimeToFileTime
PrepareTape
winmm
timeGetSystemTime
user32
GetTitleBarInfo
ChangeClipboardChain
GetWindow
GetTitleBarInfo
PackDDElParam
SetProcessDefaultLayout
SetWindowPos
PrintWindow
DlgDirListComboBoxW
CreateAcceleratorTableA
MessageBoxTimeoutA
SendInput
LoadMenuIndirectA
PostThreadMessageA
DlgDirSelectComboBoxExA
RegisterMessagePumpHook
IsDlgButtonChecked
MessageBoxA
TrackMouseEvent
CreateDesktopA
RegisterTasklist
GetClipCursor
KillTimer
BeginPaint
SetShellWindowEx
GetUpdateRect
GetDlgItemInt
GetRawInputData
IsIconic
LoadKeyboardLayoutEx
CreateDialogIndirectParamA
RegisterClassExW
SendInput
GetTaskmanWindow
GetWindowWord
GetGUIThreadInfo
CloseWindowStation
LockSetForegroundWindow
ChildWindowFromPoint
CharUpperA
RegisterClassA
GetAltTabInfoA
SetMenuInfo
SetCaretPos
SetKeyboardState
SendDlgItemMessageA
GetTabbedTextExtentA
SetPropA
DefWindowProcA
RegisterLogonProcess
IsCharUpperA
ModifyMenuA
CountClipboardFormats
DeregisterShellHookWindow
UnhookWinEvent
CallWindowProcA
CheckMenuItem
GetThreadDesktop
MenuWindowProcA
UnhookWinEvent
CreatePopupMenu
CharPrevExA
CloseDesktop
GetWindowContextHelpId
GetTitleBarInfo
SetInternalWindowPos
EnableWindow
GetWindowTextA
CopyAcceleratorTableA
CreateCursor
CharToOemBuffW
BroadcastSystemMessageA
PeekMessageA
SendMessageTimeoutA
OffsetRect
MessageBoxExA
ShowCursor
EnumWindows
GetOpenClipboardWindow
SetDeskWallpaper
GetClientRect
RegisterWindowMessageA
HiliteMenuItem
GetWindowTextLengthW
DeleteMenu
EnableWindow
Sections
.idata Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.itext Size: 240KB - Virtual size: 585KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ