Static task
static1
Behavioral task
behavioral1
Sample
ae2dc3f7ab5d28e98959a3de776ebfff_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ae2dc3f7ab5d28e98959a3de776ebfff_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ae2dc3f7ab5d28e98959a3de776ebfff_JaffaCakes118
-
Size
199KB
-
MD5
ae2dc3f7ab5d28e98959a3de776ebfff
-
SHA1
03b674cfdd665f4160666001482ba1e978929f08
-
SHA256
d23f1825fade1022f6a5696d76d7fecaeda99c683dcfb6b65cbf4e72ea5fd576
-
SHA512
1bf5c31d206716564dbc7da81656a48c6e448a51928f1aecafe231c85fb2ca98d0deea6d2b06c4def7e251a875c1aa85cfe5e3e0022e85bd50172b5361ed6fe6
-
SSDEEP
3072:hl9hexk9+TRE0nK0FhlMHskMhZxCFls87igNfR5YyU959oeTZv7/Qpvy:hfyZTi0K0zGaSFlsKdR5YT9DThM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae2dc3f7ab5d28e98959a3de776ebfff_JaffaCakes118
Files
-
ae2dc3f7ab5d28e98959a3de776ebfff_JaffaCakes118.exe windows:4 windows x86 arch:x86
9146da512a6c13558f43453cad144689
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileTime
GetModuleHandleA
Sleep
DuplicateHandle
AddAtomW
TlsAlloc
GetLogicalDrives
GetExpandedNameW
SearchPathW
CreatePipe
GetComputerNameA
GlobalGetAtomNameW
GetProcAddress
CompareStringW
ExpandEnvironmentStringsW
user32
UnregisterClassW
EndDialog
BringWindowToTop
CreateDialogParamA
SetWindowTextA
CreateMenu
FlashWindow
LoadMenuW
EnumChildWindows
LoadIconW
PeekMessageW
mouse_event
GetDesktopWindow
SendDlgItemMessageA
GetMenuItemID
GetClassLongW
LoadImageW
GetClassInfoExW
CreateAcceleratorTableW
GetWindowRect
CreateCaret
DefWindowProcA
CheckMenuItem
UpdateWindow
GetSystemMetrics
IsDlgButtonChecked
InsertMenuA
GetDC
CharPrevA
FrameRect
SetCursorPos
GetParent
RegisterWindowMessageA
gdi32
CreateDCW
GetMiterLimit
SetBitmapDimensionEx
GetStretchBltMode
GetCurrentPositionEx
GetRandomRgn
CreateICA
SetROP2
PtVisible
StartFormPage
advapi32
RegOpenKeyW
RegDeleteKeyW
RegDeleteValueA
RegCreateKeyExW
RegOpenKeyExW
RegEnumValueW
RegRestoreKeyW
ws2_32
getprotobyname
recvfrom
urlmon
CreateURLMoniker
URLDownloadA
CreateAsyncBindCtxEx
Extract
FaultInIEFeature
HlinkNavigateMoniker
AsyncGetClassBits
URLDownloadToCacheFileW
IsJITInProgress
RegisterMediaTypeClass
UrlMkBuildVersion
CreateFormatEnumerator
RegisterMediaTypes
GetSoftwareUpdateInfo
DllCanUnloadNow
GetClassFileOrMime
winspool.drv
WaitForPrinterChange
XcvDataW
GetDefaultPrinterW
SetDefaultPrinterA
crypt32
CertVerifyCertificateChainPolicy
CryptMsgClose
CryptSignAndEncodeCertificate
CertGetPublicKeyLength
CryptMsgDuplicate
I_CryptAllocTls
I_CryptFlushLruCache
CertCreateContext
I_CryptUnregisterSmartCardStore
CertCreateCertificateContext
CryptMsgGetParam
CryptHashToBeSigned
CryptHashMessage
Sections
.leG Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.gEnlBG Size: 3KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rEYyJ Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ai Size: 2KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 169KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ