Static task
static1
Behavioral task
behavioral1
Sample
cdf6b4ef0c8f59d09b45c6a24ba50da3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cdf6b4ef0c8f59d09b45c6a24ba50da3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cdf6b4ef0c8f59d09b45c6a24ba50da3_JaffaCakes118
-
Size
294KB
-
MD5
cdf6b4ef0c8f59d09b45c6a24ba50da3
-
SHA1
83c7914420bd52c5d235de5167448f2c7046dcee
-
SHA256
26e7bdf74b3449b6a707254b7ecebf55e33199e92533097a1a894ccd8e613453
-
SHA512
c6d71b4d031587c1913b0d192f7dc306b2a07f9e4ae5f9ccb25ca6b834f3d0f06ba6cceed33714915735218fe32d1d6b62a061b6793414bc0a11fd0cde52576a
-
SSDEEP
6144:EHb459HwzZPRvDfHirH5aoozjaBhX4BRYoPWFNV62V2hou0lYmrBHNy:ck/QxRvDfHC5FozjaBZ4BR9dm2SqmrBt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cdf6b4ef0c8f59d09b45c6a24ba50da3_JaffaCakes118
Files
-
cdf6b4ef0c8f59d09b45c6a24ba50da3_JaffaCakes118.exe windows:4 windows x86 arch:x86
1c1fce0f332615e8d2dec33eb6c312f5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetFileTitleA
gdi32
GetBoundsRect
GdiSetBatchLimit
GetGlyphOutlineW
ColorMatchToTarget
PolyBezierTo
GetFontLanguageInfo
FixBrushOrgEx
StrokeAndFillPath
GetMetaFileA
GetLogColorSpaceA
user32
DlgDirSelectComboBoxExW
DlgDirSelectExW
PostMessageW
GetWindowRect
EndDeferWindowPos
SendNotifyMessageW
GetMenu
MessageBoxW
GetMenuStringW
CascadeChildWindows
shell32
SHGetFileInfo
ExtractIconA
SHQueryRecycleBinW
CommandLineToArgvW
DragQueryPoint
SHBrowseForFolderW
SheSetCurDrive
DragQueryFile
ShellExecuteEx
SHFileOperationA
SHQueryRecycleBinA
DragAcceptFiles
ShellHookProc
SHGetPathFromIDList
ExtractAssociatedIconExA
SHEmptyRecycleBinA
SHGetMalloc
RealShellExecuteExA
kernel32
GetStdHandle
MultiByteToWideChar
EnumSystemLocalesA
WideCharToMultiByte
SetConsoleCtrlHandler
GetModuleFileNameW
GetTimeZoneInformation
GetVersionExA
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
GetEnvironmentStringsW
GetDriveTypeW
GetDateFormatA
FreeLibrary
GetCommandLineW
WriteFile
GetTickCount
IsDebuggerPresent
IsValidLocale
SetHandleCount
GetFileType
FoldStringW
SetWaitableTimer
UnhandledExceptionFilter
HeapFree
GetModuleFileNameA
TlsSetValue
GlobalAddAtomA
GetModuleHandleA
HeapSize
VirtualQuery
GetStartupInfoW
HeapAlloc
WriteConsoleOutputCharacterW
ResetEvent
GetACP
LCMapStringA
Sleep
ReleaseSemaphore
VirtualFree
InitializeCriticalSection
TlsAlloc
GetStartupInfoA
InterlockedExchange
LoadLibraryA
TlsGetValue
CompareStringA
DeleteCriticalSection
LeaveCriticalSection
CompareStringW
GetTempFileNameA
HeapReAlloc
GetProcAddress
GetCurrentThread
GetTimeFormatA
GetLastError
GetProcessHeap
InterlockedIncrement
HeapDestroy
GetEnvironmentStrings
VirtualAlloc
GetLocaleInfoA
IsValidCodePage
EnterCriticalSection
OpenWaitableTimerW
GetCurrentThreadId
TlsFree
QueryPerformanceCounter
GetCommandLineA
RtlUnwind
HeapCreate
LocalCompact
GetLocaleInfoW
WaitForMultipleObjectsEx
InterlockedDecrement
GetCPInfo
GetUserDefaultLCID
GetCurrentProcessId
GetCurrentProcess
FreeEnvironmentStringsA
GetStringTypeA
SetEnvironmentVariableA
LCMapStringW
FreeEnvironmentStringsW
GetStringTypeW
SetLastError
GetOEMCP
ExitProcess
TerminateProcess
Sections
.text Size: 141KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 140KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ