Static task
static1
Behavioral task
behavioral1
Sample
c80c6ccbd675d63c009928de17d5e13a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c80c6ccbd675d63c009928de17d5e13a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c80c6ccbd675d63c009928de17d5e13a_JaffaCakes118
-
Size
232KB
-
MD5
c80c6ccbd675d63c009928de17d5e13a
-
SHA1
663a81c6987eef0bca3b6983d34ed8223764339b
-
SHA256
b1b34775243761a721228e2e32779666d40377b81ca45c3f8608a4789c965be1
-
SHA512
2f589752df22f4a92187ba7906f4218b6e75dbbb36ab391dd749f374d2707703e76b94d00542ac5c5bfa7111248c242e287a5c4d24a450955a60fb1d8ce49cbb
-
SSDEEP
6144:cPzuKor3iIvsFdMU7kj2CqYFZJWCNj9f75+kOT:cPEr3iIKMpLWSpj5ZO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c80c6ccbd675d63c009928de17d5e13a_JaffaCakes118
Files
-
c80c6ccbd675d63c009928de17d5e13a_JaffaCakes118.exe windows:5 windows x86 arch:x86
16ff4cd8282b84ed893798649330ecad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlFillMemory
NtCreateTimer
RtlInitUnicodeString
NtSetDefaultLocale
RtlExitUserThread
ZwProtectVirtualMemory
ZwIsProcessInJob
NtSetInformationProcess
RtlFreeUnicodeString
bidie319
_FDscale
_FDenorm
_Stof
_Strxfrm
_LPoly
_FDtest
_Stold
_FInf
_Toupper
_Strcoll
_Rteps
_FEps
gdi32
CreateCompatibleBitmap
GetGlyphOutlineA
GetDeviceCaps
TextOutW
SetDIBits
SetBkMode
CreateDIBSection
AbortDoc
PatBlt
SetBkColor
ExtTextOutW
kernel32
SuspendThread
GetComputerNameA
GetSystemInfo
VirtualFree
CloseHandle
CreateProcessA
GetCurrentThreadId
EnumCalendarInfoA
EnterCriticalSection
GlobalAlloc
GetPriorityClass
GetTimeZoneInformation
GlobalSize
GetProcessHeap
SetLastError
SetEvent
InterlockedDecrement
CloseHandle
ResumeThread
GetUserDefaultLCID
GetCPInfo
GetLocaleInfoA
GetFileType
QueryPerformanceCounter
GetExitCodeThread
CreateThread
TerminateProcess
LocalAlloc
CompareStringW
GetProfileStringA
CreateDirectoryA
GetFileSize
GetSystemTime
WriteFile
MulDiv
GetCommandLineW
GetVolumeInformationA
SleepEx
HeapFree
user32
GetSubMenu
ShowWindow
GetWindowThreadProcessId
FillRect
RegisterWindowMessageA
SetScrollRange
GetQueueStatus
LoadCursorW
GetDoubleClickTime
ScrollDC
UnhookWindowsHookEx
DrawMenuBar
WindowFromPoint
RegisterWindowMessageW
GetKeyState
EndDeferWindowPos
DispatchMessageA
GetCapture
CreateMenu
GetUserObjectInformationW
KillTimer
GetClipboardData
MessageBoxW
ReleaseCapture
DestroyWindow
SetWindowPlacement
GetInputState
MsgWaitForMultipleObjects
GetSystemMenu
GetScrollRange
IsRectEmpty
Sections
.text Size: 158KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ