Static task
static1
Behavioral task
behavioral1
Sample
bd2bd3a4fa30cdb110d334e6cb303991_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bd2bd3a4fa30cdb110d334e6cb303991_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bd2bd3a4fa30cdb110d334e6cb303991_JaffaCakes118
-
Size
149KB
-
MD5
bd2bd3a4fa30cdb110d334e6cb303991
-
SHA1
c0ba67ca3e39e3e9aa09ffe06adb8a931d54edbe
-
SHA256
48601339e3dd6f1128da4be72df00819f0b65814c7986a6b65ec877ceeb013ce
-
SHA512
5d598f98d39bef3ef67eb0f5bb07ed520da562253027f824f100744ce6bd438b0074cc1f3ca36786f07bb06fa6b245ea213fbf70669aeadaa240f65aad41a824
-
SSDEEP
3072:EAMJ3/3v3f3O/gQ9/BlxyGoU0OAbBmSEBB42qA3SGbjBRBDRr:IJ3/3v3f3O/g6SEBBtSKB5r
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd2bd3a4fa30cdb110d334e6cb303991_JaffaCakes118
Files
-
bd2bd3a4fa30cdb110d334e6cb303991_JaffaCakes118.exe windows:4 windows x86 arch:x86
68d27cc89024d4b6cc658663ff9bf9ac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
TrackPopupMenu
ShowWindow
SetWindowTextA
SetWindowRgn
SetWindowPos
UpdateWindow
SetTimer
SetFocus
SetDlgItemTextA
SetClassLongA
SetCapture
SendMessageA
SetWindowLongA
ReleaseCapture
RegisterClassExA
RedrawWindow
PtInRect
OffsetRect
MessageBoxA
LoadStringA
LoadIconA
LoadCursorA
LoadBitmapA
IsDlgButtonChecked
InvalidateRect
IntersectRect
GetWindowRect
GetWindowLongA
GetSystemMetrics
GetParent
GetKeyState
CloseClipboard
EmptyClipboard
OpenClipboard
SetClipboardData
GetClientRect
MoveWindow
GetDlgItemTextA
GetDlgItem
GetDlgCtrlID
GetDC
GetCursorPos
GetCapture
GetActiveWindow
EndDialog
EnableWindow
DrawTextA
DialogBoxParamA
DefWindowProcA
CreateWindowExA
CreatePopupMenu
CheckDlgButton
CallWindowProcA
AppendMenuA
kernel32
FindFirstFileA
GetStdHandle
WriteFile
FlushFileBuffers
CompareStringA
CreateDirectoryA
GlobalAlloc
GlobalLock
GlobalUnlock
FindClose
lstrlenW
lstrlenA
lstrcpyA
lstrcmpiA
lstrcmpA
lstrcatA
WideCharToMultiByte
WaitForSingleObject
VirtualFree
VirtualAlloc
UnmapViewOfFile
Sleep
SizeofResource
AttachConsole
CloseHandle
CopyFileA
CreateFileA
CreateFileMappingA
CreateProcessA
CreateThread
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
FindResourceA
FreeLibrary
GetCommandLineA
GetCurrentDirectoryA
GetFileAttributesA
GetFileSize
GetFileTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetTempPathA
LoadLibraryA
LoadResource
MapViewOfFile
MoveFileA
MultiByteToWideChar
RtlMoveMemory
RtlZeroMemory
SetCurrentDirectoryA
SetEndOfFile
SetEnvironmentVariableA
SetFileAttributesA
SetFilePointer
SetFileTime
shell32
ShellExecuteA
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
CreateFontIndirectA
CreateSolidBrush
ExtCreateRegion
GetStockObject
GetTextExtentPointA
RemoveFontResourceA
TextOutA
SetTextColor
SetBkMode
SetBkColor
SelectObject
RoundRect
AddFontResourceA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
comdlg32
GetOpenFileNameA
GetSaveFileNameA
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ