Static task
static1
Behavioral task
behavioral1
Sample
b06d55139fc1e6eacb7ff9962c9491d0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b06d55139fc1e6eacb7ff9962c9491d0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b06d55139fc1e6eacb7ff9962c9491d0_JaffaCakes118
-
Size
191KB
-
MD5
b06d55139fc1e6eacb7ff9962c9491d0
-
SHA1
d61d3d09391b8ca67e5be89a74ed3882bdd5b420
-
SHA256
4a2071dd9eab5c546f70560f48de9a0612a21d0b0115642f5aff89db359fbd96
-
SHA512
8fa63e6d3cd28de799a7d3dfaed57721740571a85c06d3d27215291053cf8dec904d51a484bc8c4d5e2bbd84bfbcf20c52f78dffb59e539566fd56a1e5e644ef
-
SSDEEP
3072:0dGXz3URprtxUrE0qEnsufSipnyRBb8iWBV2uvDNAUawwrmcWiWm4wmL7wddCsFr:0kOt/90JzCBQx2kNRawmmcrWmc7w/Jv5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b06d55139fc1e6eacb7ff9962c9491d0_JaffaCakes118
Files
-
b06d55139fc1e6eacb7ff9962c9491d0_JaffaCakes118.exe windows:5 windows x86 arch:x86
a1563661a832aa302007115dfd894ba0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CreateWindowExW
GetCapture
IsWindowEnabled
SetWindowLongW
DestroyAcceleratorTable
ShowCaret
DrawTextA
MessageBoxA
ShowCursor
GetWindowPlacement
MonitorFromPoint
GetUserObjectInformationW
GetClientRect
UpdateWindow
SetScrollRange
GetAsyncKeyState
SetRect
DispatchMessageW
TranslateMessage
GetInputState
GetScrollRange
MoveWindow
MonitorFromRect
GetWindowWord
IsWindow
EndPaint
GetDoubleClickTime
DrawFrameControl
OpenInputDesktop
ScreenToClient
EnableWindow
GetMessageExtraInfo
GetKeyboardLayoutList
GetWindow
HideCaret
ntdll
RtlDecodePointer
NtSetInformationThread
NtOpenEventPair
gdi32
CreateHatchBrush
Pie
CreateDIBitmap
DeleteObject
CreateRoundRectRgn
Rectangle
SetMapperFlags
LineTo
GetCurrentObject
GetPaletteEntries
IntersectClipRect
ExtCreatePen
SetBrushOrgEx
DPtoLP
SetBkMode
DeleteDC
GetTextExtentPointA
CreatePen
SetRectRgn
GetClipBox
CopyMetaFileW
GetViewportExtEx
GdiFlush
SetROP2
GetCharWidthA
GetCurrentPositionEx
SelectPalette
GetBitmapBits
CreateFontIndirectW
SetEnhMetaFileBits
SetWindowOrgEx
GetTextMetricsW
Polygon
kernel32
CloseHandle
SearchPathW
GetUserDefaultLCID
UnlockFile
FindResourceW
LocalAlloc
VirtualAllocEx
EnumCalendarInfoW
FindNextFileW
GlobalLock
CreateFileW
GetPriorityClass
GetCurrentProcessId
GetLocalTime
SetErrorMode
IsDBCSLeadByteEx
DeleteFileW
InterlockedDecrement
GetSystemDefaultLCID
GlobalFree
EnumSystemLocalesW
SleepEx
GetCurrentThreadId
ole32
OleTranslateAccelerator
CoDisconnectObject
OleSetClipboard
OleSave
GetRunningObjectTable
CreateDataAdviseHolder
OleGetClipboard
WriteClassStg
CoInitialize
CoGetMalloc
StgOpenStorageOnILockBytes
OleIsRunning
OleFlushClipboard
StgCreateDocfile
jgmddgc2
_LExp
_LDtest
_FNan
_FCosh
_Toupper
_Nan
_LPoly
_Xbig
_Sinh
_Eps
_Poly
_Rteps
_FDnorm
_Strxfrm
_Dnorm
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ