Static task
static1
Behavioral task
behavioral1
Sample
b603224513017bf72a1ccd230f1afa97_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b603224513017bf72a1ccd230f1afa97_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b603224513017bf72a1ccd230f1afa97_JaffaCakes118
-
Size
125KB
-
MD5
b603224513017bf72a1ccd230f1afa97
-
SHA1
b97350164afa45727b95ab13d724702925fe41b4
-
SHA256
e61bd1086ec7e6cebe7279c9fa8d6100b22f92d32406fce34f3a11e6f2ddb0fd
-
SHA512
5a5301a10686c990bb686c140bf7439dd402a769729f9267958ab102c02efc1f5755428e2c2c589c279f7233210c8f462a88060698f0451123087110ae23f63d
-
SSDEEP
3072:jjaX4mLnMr2HCxPtAgWJv49CDv3+BQwYMSvFRPtIAl:qXxor2iVXEAgiBVYMkFxtIA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b603224513017bf72a1ccd230f1afa97_JaffaCakes118
Files
-
b603224513017bf72a1ccd230f1afa97_JaffaCakes118.exe windows:4 windows x86 arch:x86
d17930ec6ecb1e76487fa3f51c3c6129
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
FreeEnvironmentStringsW
GetVersionExA
InterlockedDecrement
GetLocaleInfoA
DnsHostnameToComputerNameW
GetProcAddress
LoadLibraryA
CreateThread
lstrcmpiW
WriteFile
GetModuleHandleW
FormatMessageA
HeapFree
TerminateProcess
GetOEMCP
GetLocalTime
GlobalFree
GlobalLock
GetLastError
GlobalUnlock
GetModuleHandleA
msvcrt
isalnum
__dllonexit
_vsnprintf
strchr
wcscmp
iscntrl
isspace
atoi
memcpy
_wtol
iswalnum
free
wcscat
_adjust_fdiv
__getmainargs
isdigit
_acmdln
__set_app_type
isgraph
wcslen
wcstol
wcstok
memset
_wcsicmp
fclose
swprintf
user32
LoadStringA
SetWindowTextW
RedrawWindow
FindWindowW
MessageBeep
LoadMenuA
IsDlgButtonChecked
GetWindowLongA
DrawEdge
FrameRect
DefWindowProcW
DrawIconEx
SetScrollPos
EndDialog
LoadStringW
SystemParametersInfoA
RegisterShellHookWindow
DrawTextW
GetMessageA
CharUpperW
OemToCharW
IsWindowVisible
GetMenu
AppendMenuW
CopyRect
PeekMessageW
gdi32
TranslateCharsetInfo
DeleteObject
ExtTextOutW
CreateCompatibleDC
CreatePalette
GetTextExtentPoint32W
GetTextExtentPointW
CreateSolidBrush
PatBlt
CreateFontIndirectW
LineTo
GetTextMetricsW
SetBkColor
MoveToEx
Rectangle
StretchBlt
tapi32
lineDrop
lineCreateAgentSessionW
phoneGetMessage
phoneGetButtonInfo
lineGetAddressCaps
lineGetDevConfigW
lineSetAgentStateEx
lineConfigDialogEdit
comdlg32
GetOpenFileNameW
shell32
SHGetMalloc
SHGetFolderPathW
SHGetPathFromIDListW
ShellExecuteW
ShellAboutW
SHGetSpecialFolderLocation
winmm
mmGetCurrentTask
auxOutMessage
mixerGetLineInfoA
mmioDescend
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
member1 Size: 512B - Virtual size: 278B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
member2 Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
member3 Size: 512B - Virtual size: 401B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 76B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ