Static task
static1
Behavioral task
behavioral1
Sample
aff34a0bf4f7178e4369c9114654a9ce_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aff34a0bf4f7178e4369c9114654a9ce_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aff34a0bf4f7178e4369c9114654a9ce_JaffaCakes118
-
Size
157KB
-
MD5
aff34a0bf4f7178e4369c9114654a9ce
-
SHA1
17326384fb30e9e91f83d8d0ce5465c72d515dd1
-
SHA256
33c1e3737d48a1bef4b2b83150884412802e3ce7ca48fcb3af73b1cdcaf89368
-
SHA512
523dbcc180e4487128428a14960367500f99f7682aea761ecd3c0f77f86e4154df23a7787753e80a47de2f4f739340abcc0f18018e73fcc4ea1df380a1718030
-
SSDEEP
3072:QZu3R57MX/jZahkUPpsiFf1Rw5gKPmBJKfNSGCeQY99D7NcYeAz1I8RkQ2n05:QZun74ahLOGdRw2KOGgGCTYb3NOAz15/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aff34a0bf4f7178e4369c9114654a9ce_JaffaCakes118
Files
-
aff34a0bf4f7178e4369c9114654a9ce_JaffaCakes118.exe windows:4 windows x86 arch:x86
7b31ad4f5be069f48fc7339fc3b0b823
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ddraw
DirectDrawCreate
DirectDrawEnumerateA
DirectDrawCreateEx
shell32
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetFileInfoA
SHFileOperationA
ShellExecuteA
SHGetPathFromIDListA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
comctl32
ImageList_Destroy
ImageList_AddMasked
gdi32
CreateFontIndirectA
DeleteObject
CreateBrushIndirect
SetBkMode
SetTextColor
GetDeviceCaps
SelectObject
SetBkColor
advapi32
RegDeleteKeyA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegDeleteValueA
RegEnumKeyA
RegCreateKeyExA
RegEnumValueA
RegQueryValueExA
ole32
CoCreateInstance
OleInitialize
OleUninitialize
CoTaskMemFree
kernel32
GetEnvironmentVariableA
GetThreadLocale
GetCurrentProcessId
InterlockedExchange
lstrcmpiA
FormatMessageA
GetStartupInfoA
InterlockedCompareExchange
SetUnhandledExceptionFilter
CompareStringW
GetCurrentProcess
GetEnvironmentVariableW
GetProcessVersion
lstrlenW
GetStringTypeExA
GetACP
GetProcAddress
ExitProcess
GetLocaleInfoA
CompareStringA
IsDebuggerPresent
GetLastError
UnhandledExceptionFilter
HeapAlloc
GetStringTypeExW
GetVersion
Sleep
lstrcmpiW
FreeLibrary
QueryPerformanceCounter
LoadLibraryA
WideCharToMultiByte
GetVersionExA
TerminateProcess
MultiByteToWideChar
lstrlenA
GetProcessHeap
HeapFree
user32
LoadCursorA
SetCursor
SetWindowLongA
BeginPaint
GetDlgItemTextA
PeekMessageA
GetMessagePos
SetWindowPos
SetTimer
GetSysColor
TrackPopupMenu
CloseClipboard
LoadBitmapA
CallWindowProcA
GetDC
SetClassLongA
GetWindowLongA
DestroyWindow
SetWindowTextA
wsprintfA
SetClipboardData
RegisterClassA
SendMessageTimeoutA
OpenClipboard
DrawTextA
GetWindowRect
PostQuitMessage
GetClassInfoA
DefWindowProcA
CreatePopupMenu
GetSystemMetrics
AppendMenuA
DispatchMessageA
CharPrevA
EmptyClipboard
SetDlgItemTextA
ExitWindowsEx
IsWindowEnabled
CreateDialogParamA
ScreenToClient
CreateWindowExA
SystemParametersInfoA
GetSystemMenu
FindWindowExA
CharNextA
IsWindowVisible
IsWindow
EnableMenuItem
DialogBoxParamA
FillRect
MessageBoxIndirectA
CheckDlgButton
GetClientRect
SetForegroundWindow
LoadImageA
InvalidateRect
ShowWindow
SendMessageA
EnableWindow
GetDlgItem
EndPaint
EndDialog
Sections
.text Size: 85KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ