Static task
static1
Behavioral task
behavioral1
Sample
ba7a14765a4218b102cdeb18461db684_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba7a14765a4218b102cdeb18461db684_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ba7a14765a4218b102cdeb18461db684_JaffaCakes118
-
Size
199KB
-
MD5
ba7a14765a4218b102cdeb18461db684
-
SHA1
8bfa3d1c689e4902899a6e104ba20a1eb91647fc
-
SHA256
17c6a60dab4e17248be6f9e86ce4712a1af8da749e0fc1e52d5905a7d13e616e
-
SHA512
15cdd771db058d481142a0c42ab39aa29794552bacc8edebc32134b5ac372948eb9bcc1198a626be50308dc7930503fff66a8b9eb8165846528277f95b03d1f9
-
SSDEEP
3072:s3nc1L7UsWIHH9yZ7Anlm2SrfPw/xESYn6jICudXLpUxCilg20kEX7lK/:DdUsWwwg4JF6jICuJLOxCyg20TlO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ba7a14765a4218b102cdeb18461db684_JaffaCakes118
Files
-
ba7a14765a4218b102cdeb18461db684_JaffaCakes118.exe windows:4 windows x86 arch:x86
52e1b1677f3aeb87c5cf2ccb94aa5f65
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
comdlg32
GetFileTitleA
gdi32
SetTextColor
RoundRect
SetStretchBltMode
PlgBlt
GetBitmapBits
StrokePath
GetPath
AnimatePalette
PolyBezier
CreateFontIndirectA
FlattenPath
GetBkColor
ExtCreatePen
CreatePen
SetDIBits
rpcrt4
RpcBindingFromStringBindingA
NdrClientCall
RpcStringBindingComposeA
RpcBindingSetAuthInfoA
RpcStringFreeA
ole32
CLSIDFromProgID
OleRegGetUserType
GetHGlobalFromStream
CreateStreamOnHGlobal
RevokeDragDrop
CoCreateInstance
CoTaskMemFree
StgCreateDocfileOnILockBytes
CoFreeUnusedLibraries
CoCreateGuid
CoGetMalloc
GetHGlobalFromILockBytes
RegisterDragDrop
CLSIDFromString
OleDuplicateData
OleRun
CoGetClassObject
CoTaskMemAlloc
ReleaseStgMedium
OleGetAutoConvert
ProgIDFromCLSID
StgOpenStorageOnILockBytes
StringFromCLSID
CreateILockBytesOnHGlobal
user32
UnhookWindowsHookEx
RegisterClassW
ToAscii
ChildWindowFromPoint
IsClipboardFormatAvailable
SetWindowsHookExW
DestroyCursor
WinHelpW
ClipCursor
SetScrollRange
MonitorFromWindow
DestroyIcon
CallNextHookEx
GetSysColorBrush
EmptyClipboard
SetWindowPos
SetClipboardData
DefWindowProcW
DrawEdge
GetSysColor
comctl32
ImageList_GetIconSize
ImageList_Add
ImageList_Create
ImageList_DrawEx
ImageList_Destroy
kernel32
UnlockFile
FileTimeToLocalFileTime
GetSystemTime
CreateFiber
IsDBCSLeadByte
SetCommConfig
GetProfileStringW
LocalAlloc
SearchPathW
SetEndOfFile
VerLanguageNameW
EnumResourceNamesW
CompareStringW
LockFile
GetFileAttributesA
GetUserDefaultLangID
GetVersionExW
FlushFileBuffers
FileTimeToSystemTime
GetFileType
FlushFileBuffers
FindResourceExA
GetVolumeInformationW
GetFileTime
GetSystemDirectoryW
shlwapi
PathStripToRootW
PathIsRootW
PathIsURLW
PathCanonicalizeW
PathIsRelativeW
PathCombineW
Sections
.text Size: 175KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lib Size: 512B - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ