Static task
static1
Behavioral task
behavioral1
Sample
b3071339e3b6e11c70329c7ecbfe5077_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b3071339e3b6e11c70329c7ecbfe5077_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b3071339e3b6e11c70329c7ecbfe5077_JaffaCakes118
-
Size
64KB
-
MD5
b3071339e3b6e11c70329c7ecbfe5077
-
SHA1
b9a38a94cb487140449661dc13ca5c0f5a048a12
-
SHA256
814a4fee5902f3a504f605241965b303e46608d8f3f85cb94a9b0a08e14d44fd
-
SHA512
6704bc8b2b1362756a61acdf96a14da9f905b99f6f9246bd93d3ab29ee726fb11841f0bdfd823a4d12463e9bdfbb09521b3900493269720dca59f239a8bcc5e2
-
SSDEEP
1536:XJFY9iogfi0ri7xUa8jFkiUZuoLqmcrofjgWfU:XsdgfZyxUhkjZvokfjg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b3071339e3b6e11c70329c7ecbfe5077_JaffaCakes118
Files
-
b3071339e3b6e11c70329c7ecbfe5077_JaffaCakes118.exe windows:4 windows x86 arch:x86
9f96640dd2565acd7ce49e093f6705ff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDC
BlockInput
IsMenu
GetWindowTextLengthA
CalcMenuBar
IsWindow
AlignRects
CreateIcon
CopyIcon
GetCursor
DrawTextA
DialogBoxParamW
InsertMenuA
DrawIcon
DrawTextW
CloseWindow
EndDialog
DialogBoxParamA
AppendMenuA
LoadCursorA
GetFocus
GetDlgItem
DrawIconEx
GetWindowTextA
IsWindow
DrawTextW
BlockInput
EndDialog
GetCursor
AlignRects
AppendMenuW
IsMenu
DialogBoxParamW
GetMenu
GetDlgItem
GetWindowTextLengthA
DialogBoxParamA
GetDC
GetWindowTextA
CopyImage
DrawIcon
AppendMenuA
InsertMenuA
CopyRect
CreateIcon
CopyIcon
advapi32
RegQueryValueExW
RegQueryValueA
RegDeleteKeyW
RegGetKeySecurity
RegCreateKeyExW
RegCreateKeyW
RegQueryInfoKeyA
RegQueryValueExA
RegLoadKeyA
RegOpenKeyExW
RegReplaceKeyW
RegDeleteKeyA
RegEnumValueA
RegEnumKeyW
RegLoadKeyW
RegDeleteValueW
RegQueryValueExW
RegQueryInfoKeyW
RegReplaceKeyW
RegCreateKeyExA
RegOpenKeyA
RegDeleteValueW
RegQueryValueA
RegReplaceKeyA
RegEnumKeyW
RegEnumKeyA
RegQueryInfoKeyA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyW
RegEnumKeyExW
RegGetKeySecurity
RegOpenKeyW
RegFlushKey
RegEnumKeyExA
RegEnumValueA
RegLoadKeyW
RegLoadKeyA
RegCreateKeyW
RegCreateKeyExW
RegLoadKeyA
RegQueryValueA
RegEnumValueW
RegEnumKeyA
RegCreateKeyW
RegGetKeySecurity
RegOpenKeyA
RegDeleteKeyW
RegQueryInfoKeyW
RegLoadKeyW
RegOpenKeyExA
RegEnumKeyExA
RegOpenKeyW
RegOpenKeyExW
RegFlushKey
RegQueryInfoKeyA
RegEnumKeyW
RegReplaceKeyW
RegQueryValueExW
gdi32
CreateSolidBrush
AddFontResourceA
AddFontResourceExW
ExcludeClipRect
CloseMetaFile
AddFontMemResourceEx
AddFontResourceW
GetCurrentPositionEx
GetPixel
DeleteObject
ClearBitmapAttributes
GetClipBox
GetPixel
GetBitmapBits
DeleteDC
GetBrushOrgEx
AddFontResourceExW
ClearBitmapAttributes
CreateSolidBrush
GetBrushOrgEx
GetClipBox
BitBlt
GetCurrentPositionEx
CancelDC
SetTextColor
ClearBrushAttributes
ExcludeClipRect
DeleteObject
GetDCOrgEx
GetPixel
AddFontMemResourceEx
GetPixel
GetDCOrgEx
SetTextColor
CloseFigure
GetPixel
BeginPath
GetBrushOrgEx
AddFontMemResourceEx
GetCurrentPositionEx
CloseMetaFile
AddFontResourceExA
ClearBitmapAttributes
AbortPath
GetBitmapBits
AddFontResourceExW
ExtTextOutA
AddFontResourceW
CreateSolidBrush
DeleteDC
BitBlt
GetClipBox
CopyMetaFileA
DeleteObject
comctl32
ImageList_DragMove
ImageList_Remove
ImageList_Draw
ImageList_AddMasked
ImageList_LoadImageA
ImageList_ReplaceIcon
ImageList_Copy
ImageList_Merge
ImageList_BeginDrag
ImageList_GetDragImage
ImageList_LoadImageW
ImageList_Replace
ImageList_GetIconSize
ImageList_LoadImage
ImageList_DragEnter
ImageList_Destroy
ImageList_EndDrag
ImageList_AddIcon
ImageList_GetImageInfo
ImageList_GetImageCount
ImageList_DrawEx
ImageList_DrawIndirect
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 2KB
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ