Static task
static1
Behavioral task
behavioral1
Sample
b8261ba78e4c4b6f22a1bedb8ab2cb74_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b8261ba78e4c4b6f22a1bedb8ab2cb74_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b8261ba78e4c4b6f22a1bedb8ab2cb74_JaffaCakes118
-
Size
39KB
-
MD5
b8261ba78e4c4b6f22a1bedb8ab2cb74
-
SHA1
89997f99d79afb3c7f9f002085fef012d3a58eac
-
SHA256
927aa69c1e68bdd4d102de6060159d923191bdf89bceadb6c42d6edcb068db06
-
SHA512
ba0cc2151006413bb7ca716f01d6bb4feb5d6aeb4a74eb1ae96b2bcc04e8a8eb18b60ae38f4053a0c63c9f54ea48c0c60cd280e6554a8f4b7418b75312781561
-
SSDEEP
768:N/hftOro5a+1a0Hae1T8A8TPl0NYotLjUWzQxH:N51Os3FISNYotPUqQF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b8261ba78e4c4b6f22a1bedb8ab2cb74_JaffaCakes118
Files
-
b8261ba78e4c4b6f22a1bedb8ab2cb74_JaffaCakes118.exe windows:1 windows x86 arch:x86
dd0b45a0c8731a952fbe65b3aa913d07
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
DragQueryFileA
DragFinish
DragAcceptFiles
ShellAboutA
kernel32
LocalAlloc
LocalLock
LocalReAlloc
lstrlenA
_lclose
DeleteFileA
_lwrite
LocalUnlock
lstrcmpA
lstrcpynA
_llseek
LocalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetLocalTime
GetTimeFormatA
GetDateFormatA
lstrcmpiA
GetProfileStringA
lstrcatA
FindFirstFileA
FindClose
lstrcpyA
GetLastError
CreateFileA
GetCommandLineA
GetLocaleInfoA
GlobalFree
ExitProcess
GetStartupInfoA
GetModuleHandleA
_lcreat
_lopen
_lread
user32
GetMessageA
IsDialogMessageA
GetWindowTextA
CharNextA
CheckMenuItem
CloseClipboard
IsClipboardFormatAvailable
OpenClipboard
GetSubMenu
GetMenu
LoadStringA
LoadAcceleratorsA
GetSystemMenu
RegisterWindowMessageA
SetWindowLongA
CreateWindowExA
LoadCursorA
RegisterClassExA
GetSystemMetrics
SetCursor
UpdateWindow
CharPrevA
GetClientRect
PeekMessageA
SetDlgItemTextA
TabbedTextOutA
CreateDialogParamA
EnableWindow
TranslateAcceleratorA
ReleaseDC
GetDC
SendDlgItemMessageA
GetDlgCtrlID
ChildWindowFromPoint
ScreenToClient
GetCursorPos
GetDlgItemTextA
wsprintfA
PostQuitMessage
IsIconic
DestroyWindow
MessageBeep
MessageBoxA
DefWindowProcA
EnableMenuItem
GetLastActivePopup
ShowWindow
EndDialog
SetForegroundWindow
WinHelpA
LoadIconA
SendMessageA
GetFocus
PostMessageA
SetFocus
InvalidateRect
MoveWindow
DispatchMessageA
TranslateMessage
SetWindowTextA
gdi32
CreateDCA
GetTextCharset
SelectObject
GetStockObject
DeleteDC
AbortDoc
DeleteObject
StartPage
StartDocA
EndPage
GetTextExtentPointA
GetDeviceCaps
SetAbortProc
GetTextMetricsA
SetBkMode
CreateFontA
LPtoDP
SetWindowExtEx
SetMapMode
EndDoc
SetViewportExtEx
comdlg32
GetSaveFileNameA
PageSetupDlgA
FindTextA
GetOpenFileNameA
GetFileTitleA
CommDlgExtendedError
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 530B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE