Static task
static1
Behavioral task
behavioral1
Sample
b48b99630a27837c03e8b82ced61f391_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b48b99630a27837c03e8b82ced61f391_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b48b99630a27837c03e8b82ced61f391_JaffaCakes118
-
Size
80KB
-
MD5
b48b99630a27837c03e8b82ced61f391
-
SHA1
6e154d761b5a2d6253dc6135ac14817b8f0ab650
-
SHA256
a93e133cc0d709c009cbd72b96c79fec6cbfb7b6fa7f0370ff17ee77f95609f2
-
SHA512
3d8f3ed4692b7b8d4fccd4f3cf58d32697be0174cb1a45edc4d444a284d2e8b2b6e51908615371b9ec23dda8749430e30d1a6f8b940d9923ccec88b34457d694
-
SSDEEP
1536:IPPEyu6yr1OY+4RI2WGBoxj54UrMW1jFLuMSADz72mMyWsSsM:IPP7u7x5WqU+UgW/yuDvPxWs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b48b99630a27837c03e8b82ced61f391_JaffaCakes118
Files
-
b48b99630a27837c03e8b82ced61f391_JaffaCakes118.exe windows:4 windows x86 arch:x86
ec56ff4a0ae274c36bc94f9bccf139b8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
PostQuitMessage
SetWindowPos
UnhookWindowsHookEx
SetWindowTextA
EnumWindows
FrameRect
EqualRect
GetMessageA
GetSysColorBrush
GetSubMenu
EnableMenuItem
GetScrollPos
GetSysColor
kernel32
ExitProcess
GetTickCount
GetThreadLocale
GetCurrentProcessId
InterlockedExchange
FileTimeToSystemTime
GetTimeZoneInformation
GetTempPathA
VirtualAllocEx
RtlUnwind
GetSystemTime
SetUnhandledExceptionFilter
GetStartupInfoA
GetFileAttributesA
GetOEMCP
gdi32
CopyEnhMetaFileA
FillRgn
GetMapMode
DPtoLP
SetViewportExtEx
ExcludeClipRect
SelectClipPath
CreateICW
CreateCompatibleBitmap
ole32
DoDragDrop
CoTaskMemRealloc
StgOpenStorage
CoRevokeClassObject
OleRun
StringFromGUID2
CoInitializeSecurity
CoInitialize
CoCreateInstance
advapi32
GetUserNameA
RegQueryValueExW
GetSecurityDescriptorDacl
RegCreateKeyA
CryptHashData
CheckTokenMembership
FreeSid
AdjustTokenPrivileges
QueryServiceStatus
RegCreateKeyExW
msvcrt
_mbscmp
strncpy
__setusermatherr
_fdopen
strlen
strcspn
raise
iswspace
_flsbuf
__initenv
__getmainargs
fflush
_CIpow
signal
puts
fprintf
_strdup
_lock
comctl32
ImageList_Write
ImageList_Destroy
CreatePropertySheetPageA
ImageList_LoadImageA
ImageList_DragEnter
ImageList_SetIconSize
ImageList_GetIcon
ImageList_GetBkColor
ImageList_DrawEx
ImageList_LoadImageW
InitCommonControls
ImageList_GetIconSize
ImageList_ReplaceIcon
shell32
ShellExecuteEx
CommandLineToArgvW
SHGetPathFromIDList
SHBrowseForFolderA
DragQueryFileA
ExtractIconExW
ExtractIconW
DragAcceptFiles
ShellExecuteW
DoEnvironmentSubstW
DragQueryFileW
oleaut32
VariantCopy
SafeArrayGetUBound
SysReAllocStringLen
SafeArrayPtrOfIndex
SafeArrayCreate
SafeArrayPutElement
SafeArrayRedim
SafeArrayUnaccessData
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE