Static task
static1
Behavioral task
behavioral1
Sample
ba341c9ae5a1c2293d9abc66436a502d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba341c9ae5a1c2293d9abc66436a502d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ba341c9ae5a1c2293d9abc66436a502d_JaffaCakes118
-
Size
82KB
-
MD5
ba341c9ae5a1c2293d9abc66436a502d
-
SHA1
05416411a10c1a9b008dce7911556d0a9bfb433f
-
SHA256
96f4db21bc75e40bd52b991a8af8fdf1be503b7dfbc04053d3eb0f6674347617
-
SHA512
76980b3062aa7d0db3cbd0b792735519abd01b28eb9be7f117412673a421054f8b96d97767e518c1485ad13a1b1249939ef928ca2b577cda6998a3285430d770
-
SSDEEP
1536:t0OFw/st2LtsBW9Hx6N/gbZapidA1zXZw2k7lae0i9cjaD5L7ZBe:t0OFw/O2LWBW9RbApid2zXZu51QstZBe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ba341c9ae5a1c2293d9abc66436a502d_JaffaCakes118
Files
-
ba341c9ae5a1c2293d9abc66436a502d_JaffaCakes118.exe windows:5 windows x86 arch:x86
a74d5c02f90d702578c1f8ea255eda38
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
EnableMenuItem
GetSubMenu
EqualRect
UnhookWindowsHookEx
GetSysColorBrush
SetWindowTextA
FrameRect
PostQuitMessage
GetScrollPos
EnumWindows
SetWindowPos
GetSysColor
GetMessageA
kernel32
GetThreadLocale
GetCurrentProcessId
GetSystemTime
GetTickCount
SetUnhandledExceptionFilter
GetStartupInfoA
GetTimeZoneInformation
GetACP
ExitProcess
VirtualAllocEx
FileTimeToSystemTime
GetTempPathA
GetFileAttributesA
InterlockedExchange
RtlUnwind
gdi32
CopyEnhMetaFileA
SetViewportExtEx
CreateCompatibleBitmap
ExcludeClipRect
CreateICW
FillRgn
DPtoLP
SelectClipPath
GetMapMode
ole32
CoInitialize
StringFromGUID2
CoInitializeSecurity
StgOpenStorage
CoTaskMemRealloc
OleRun
CoCreateInstance
CoRevokeClassObject
DoDragDrop
advapi32
QueryServiceStatus
RegQueryValueExW
GetSecurityDescriptorDacl
FreeSid
RegCreateKeyA
CryptHashData
CheckTokenMembership
RegCreateKeyExW
GetUserNameA
AdjustTokenPrivileges
msvcrt
_strdup
signal
raise
_CIpow
fflush
__getmainargs
strncpy
fprintf
strcspn
_flsbuf
__setusermatherr
puts
iswspace
_mbscmp
strlen
_lock
_fdopen
__initenv
comctl32
ImageList_LoadImageA
ImageList_GetBkColor
ImageList_GetIconSize
ImageList_DrawEx
ImageList_LoadImageW
ImageList_GetIcon
InitCommonControls
ImageList_Write
ImageList_DragEnter
ImageList_ReplaceIcon
CreatePropertySheetPageA
ImageList_SetIconSize
ImageList_Destroy
shell32
SHGetPathFromIDList
ShellExecuteEx
ShellExecuteW
SHBrowseForFolderA
ExtractIconExW
DragQueryFileW
DragAcceptFiles
CommandLineToArgvW
DoEnvironmentSubstW
ExtractIconW
DragQueryFileA
oleaut32
SafeArrayCreate
SafeArrayRedim
SafeArrayGetUBound
SafeArrayPtrOfIndex
SafeArrayUnaccessData
SysReAllocStringLen
SafeArrayPutElement
VariantCopy
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE