Static task
static1
Behavioral task
behavioral1
Sample
b8dedc6c58ba17ab28f7701d65ea6726_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b8dedc6c58ba17ab28f7701d65ea6726_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b8dedc6c58ba17ab28f7701d65ea6726_JaffaCakes118
-
Size
143KB
-
MD5
b8dedc6c58ba17ab28f7701d65ea6726
-
SHA1
34e9cb966fc0550a5c3d6931e3d65f54f1f40160
-
SHA256
ae0c12e06038e4c8b0d3b262776a8e0c6fa94367c4e4940c03faf7066697a926
-
SHA512
3f3e9a4cadf38d4420b7f06156e57e8191c7351debec804bf147b7d564e3caae73fd96ed1649e1639497f56e2250b1d7dcb7c5cdd93f3eb7435bba6d564930b5
-
SSDEEP
1536:1daIV68LoPbRk3xh86VclqrSQTbisSBz/XziC5aAURVcscSs1TjixM4y80moPuJj:7vMj6h86VclquBuCORR0jixxG2B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b8dedc6c58ba17ab28f7701d65ea6726_JaffaCakes118
Files
-
b8dedc6c58ba17ab28f7701d65ea6726_JaffaCakes118.exe windows:1 windows x86 arch:x86
0b07bebe132967d87968f3f595adcf27
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
BitBlt
CreateCompatibleDC
CreateDIBSection
CreateFontA
CreatePen
CreateSolidBrush
DeleteDC
DeleteObject
GetObjectA
Rectangle
SelectObject
SetBkMode
SetTextColor
user32
BeginPaint
CharUpperA
CreateWindowExA
DefWindowProcA
DeleteMenu
DestroyWindow
DialogBoxIndirectParamA
DispatchMessageA
DrawTextA
EndDialog
EndPaint
GetDC
GetDlgItem
GetMessageA
GetSystemMenu
GetWindowRect
GetWindowTextA
InvalidateRect
IsIconic
IsWindowVisible
KillTimer
LoadCursorA
MessageBoxA
MoveWindow
PostMessageA
PostQuitMessage
RedrawWindow
RegisterClassExA
ReleaseDC
SendMessageA
SendMessageW
SetActiveWindow
SetFocus
SetForegroundWindow
SetTimer
SetWindowLongA
ShowWindow
SystemParametersInfoA
TranslateMessage
ole32
CoCreateInstance
CoInitialize
shfolder
SHGetFolderPathW
wininet
HttpOpenRequestA
HttpQueryInfoA
HttpSendRequestA
InternetCloseHandle
InternetConnectA
InternetCrackUrlA
InternetOpenA
InternetSetOptionA
advapi32
InitializeSecurityDescriptor
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
SetSecurityDescriptorDacl
rpcrt4
RpcStringFreeA
UuidCreateSequential
UuidCreate
UuidToStringA
ws2_32
WSAStartup
kernel32
CloseHandle
CreateEventA
CreateFileA
CreateMutexA
CreatePipe
CreateProcessA
CreateThread
CreateToolhelp32Snapshot
DeleteCriticalSection
DeleteFileA
DeleteFileW
DuplicateHandle
EnterCriticalSection
ExitProcess
ExitThread
FreeEnvironmentStringsA
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsA
GetFileAttributesA
GetFileSize
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetOEMCP
GetProcAddress
GetShortPathNameA
GetStdHandle
GetTempPathA
GetTickCount
GetVersion
InitializeCriticalSection
InterlockedExchange
InterlockedExchangeAdd
LeaveCriticalSection
LoadLibraryA
LocalAlloc
MoveFileA
MultiByteToWideChar
Process32First
Process32Next
ReadFile
ResumeThread
SetConsoleCtrlHandler
SetCurrentDirectoryA
SetEnvironmentVariableA
SetEnvironmentVariableW
SetEvent
SetFileAttributesW
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
Sleep
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcatW
lstrcmpiA
Sections
AUTO Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DGROUP Size: 63KB - Virtual size: 441KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ