Static task
static1
Behavioral task
behavioral1
Sample
ced848f456e632298ef98f57a8f67a84_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ced848f456e632298ef98f57a8f67a84_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ced848f456e632298ef98f57a8f67a84_JaffaCakes118
-
Size
172KB
-
MD5
ced848f456e632298ef98f57a8f67a84
-
SHA1
95c7230648330ac6d92f3d2b48757b58a3ba10df
-
SHA256
448236523d748f7c05b2e86fa4f8faf9c51572b7427277bbc06de932bccaf19f
-
SHA512
09ae4827f09bca9f137825d6f7ced3e9df214d0050e48eeebcf47a17d940ec575a8a9c6feb0ecebd676831b0e8f54b96c91a8529657ae76343213de5dcd71b01
-
SSDEEP
3072:bclioz828kE9CIaAWsSRPnujfe4cw5DwOO/RQSqDncKcScRuBAM1:bcPgTdQIqhRvSee5ZP7DnvVBr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ced848f456e632298ef98f57a8f67a84_JaffaCakes118
Files
-
ced848f456e632298ef98f57a8f67a84_JaffaCakes118.exe windows:4 windows x86 arch:x86
794d844898fc87f46229beae2358267d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetBinaryTypeA
GetSystemInfo
CloseHandle
SetConsoleWindowInfo
VirtualFreeEx
FlushConsoleInputBuffer
GetSystemWindowsDirectoryA
GetSystemPowerStatus
EnumResourceNamesA
OpenMutexA
FindNextVolumeMountPointW
LocalCompact
ExpungeConsoleCommandHistoryA
CreateFileMappingA
GetWindowsDirectoryA
MoveFileExA
GetVolumePathNameA
GetLocalTime
RegisterWaitForInputIdle
GetThreadSelectorEntry
GetEnvironmentVariableA
lstrcmpiA
EnumSystemCodePagesA
LZClose
LoadLibraryExA
ProcessIdToSessionId
VirtualAllocEx
SetTimerQueueTimer
LZSeek
AddAtomA
WriteProcessMemory
GetConsoleTitleA
GetEnvironmentStringsA
WideCharToMultiByte
OpenSemaphoreA
OpenFileMappingA
BuildCommDCBAndTimeoutsA
FlushFileBuffers
RemoveDirectoryA
GetProcessShutdownParameters
GetVolumeNameForVolumeMountPointA
ClearCommError
GetModuleFileNameA
OpenThread
FlushInstructionCache
GetThreadIOPendingFlag
WriteConsoleOutputCharacterA
ReadConsoleOutputA
GetProcessHeaps
CreateDirectoryA
OpenWaitableTimerA
GetDiskFreeSpaceExA
LocalSize
PeekConsoleInputA
RaiseException
GetConsoleCommandHistoryA
GetDllDirectoryA
LoadLibraryExW
HeapLock
GetThreadLocale
GetDiskFreeSpaceA
TransmitCommChar
Toolhelp32ReadProcessMemory
MoveFileExA
SetThreadExecutionState
EndUpdateResourceA
ResetEvent
EnumSystemLocalesA
SetProcessPriorityBoost
SetThreadAffinityMask
FindNextFileA
GetProcessHandleCount
CopyFileExA
GetExitCodeProcess
GetConsoleMode
GetLogicalDriveStringsA
DuplicateHandle
GetConsoleInputExeNameA
FlushFileBuffers
GlobalWire
SetTapeParameters
GetCommTimeouts
ReadConsoleA
Thread32Next
PeekConsoleInputA
IsBadWritePtr
winmm
timeGetSystemTime
user32
EnumWindowStationsA
ShowWindow
CharUpperBuffW
GetWindow
CreateWindowStationA
SwitchDesktop
EnumDisplayMonitors
DlgDirSelectExA
GetMenuBarInfo
InsertMenuA
UnpackDDElParam
SubtractRect
LoadImageA
DestroyReasons
ToUnicode
BeginPaint
IsCharAlphaNumericW
CloseWindow
DestroyCursor
SubtractRect
DefDlgProcA
RegisterClassExA
TabbedTextOutA
TileChildWindows
GetClassNameA
SendMessageTimeoutA
CloseClipboard
GetClipboardData
DeregisterShellHookWindow
GetWindowRect
ToUnicode
IsChild
ChildWindowFromPointEx
DlgDirListComboBoxA
GetKeyboardLayoutNameA
SetDlgItemTextA
CountClipboardFormats
CopyRect
RegisterMessagePumpHook
GetMessageTime
GetWindowModuleFileNameA
ToAscii
DrawIconEx
GetCapture
SetClassLongA
DrawCaption
ScrollDC
AllowSetForegroundWindow
GetListBoxInfo
InflateRect
IntersectRect
DefWindowProcA
GetWindowTextA
IsGUIThread
IsHungAppWindow
GetClassInfoExW
GetWindowRgnBox
LockWindowUpdate
RegisterClassExA
RegisterDeviceNotificationA
GetMessageA
UnregisterMessagePumpHook
GetMenuItemID
CharUpperA
GetProcessWindowStation
RemovePropA
GetMenuCheckMarkDimensions
GetKBCodePage
LoadCursorFromFileA
CreateSystemThreads
GetFocus
ShowScrollBar
GetWindowTextA
IsIconic
EnumDisplayDevicesA
CopyImage
SetWindowsHookExA
SetWindowsHookExW
IsCharAlphaA
DrawCaption
SetCapture
EnumWindowStationsA
RegisterClipboardFormatA
GetWindow
OpenWindowStationA
DialogBoxParamA
SendMessageTimeoutA
EnumDisplayMonitors
InsertMenuItemW
UnpackDDElParam
Sections
.idata Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.itext Size: 156KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ