Static task
static1
Behavioral task
behavioral1
Sample
cf8514d3329080804af1de4edd7fd144_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cf8514d3329080804af1de4edd7fd144_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cf8514d3329080804af1de4edd7fd144_JaffaCakes118
-
Size
44KB
-
MD5
cf8514d3329080804af1de4edd7fd144
-
SHA1
137902421798c513a9902c3b0876ed17d363d2a4
-
SHA256
c1324d543ba1f3c34c4228835118805f5e2b8a1d3f0d2d0faaab3d07a5103494
-
SHA512
85c2aedbff5023ed9ff53810166c2f2b150846591e7c51686724459604919888ac333c73f859a4b8f7878029e1137803d8b039f24c041fa26ee9e98f73abcf0a
-
SSDEEP
768:2+iCuoBjPTlPUJ73u4skoVIsIBfF4R2K1MuA06PeKYq3S:JiCxBjPTlPUJ7eREsYrhpqKpS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf8514d3329080804af1de4edd7fd144_JaffaCakes118
Files
-
cf8514d3329080804af1de4edd7fd144_JaffaCakes118.exe windows:1 windows x86 arch:x86
3cfe4d4d4d1c2138e143e6027f7bf847
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
CloseHandle
HeapAlloc
GlobalDeleteAtom
VirtualAlloc
GetModuleHandleA
CreateThread
GetCurrentThreadId
FindResourceA
lstrcmpiA
UnmapViewOfFile
FindClose
ExitProcess
GetStdHandle
FreeResource
SetFileApisToOEM
LoadResource
SetEndOfFile
GlobalFindAtomA
HeapCreate
HeapSize
SetFilePointer
VirtualFree
FindFirstFileA
GetFileAttributesA
CreateFileA
CreateFileMappingA
WaitForSingleObject
WriteFile
GlobalAddAtomA
GetCommandLineA
AreFileApisANSI
GetFileSize
GetDriveTypeA
MapViewOfFile
FindNextFileA
HeapReAlloc
HeapFree
user32
GetClientRect
GetClassNameA
GetClassLongA
wvsprintfA
TranslateMessage
ShowWindow
FillRect
EnumChildWindows
SetFocus
EnableWindow
DrawTextA
ScreenToClient
DrawIcon
SetForegroundWindow
EndPaint
SetPropA
EnumThreadWindows
ReleaseCapture
GetActiveWindow
GetCapture
GetClassInfoA
DispatchMessageA
RegisterWindowMessageA
RegisterClassExA
GetCursorPos
DestroyWindow
DestroyMenu
PeekMessageA
DefWindowProcA
DefMDIChildProcA
MessageBoxA
LockWindowUpdate
DefFrameProcA
CreateWindowExA
IsWindowVisible
CreatePopupMenu
CreateMenu
IsIconic
IsDialogMessageA
CreateDialogIndirectParamA
InvalidateRect
InflateRect
CallWindowProcA
IsWindow
IsWindowEnabled
GetWindowTextA
LoadCursorA
LoadIconA
LoadMenuA
GetWindowRect
BeginPaint
MoveWindow
OffsetRect
GetWindowLongA
PostMessageA
PostQuitMessage
RegisterClassA
GetSystemMetrics
GetSysColor
GetPropA
ReleaseDC
GetParent
SendMessageA
SetActiveWindow
SetCursor
GetNextDlgTabItem
GetLastActivePopup
SetMenu
SetParent
GetKeyState
SetWindowLongA
SetWindowPos
SetWindowTextA
GetFocus
GetDlgItem
WaitMessage
wsprintfA
GetDlgCtrlID
GetDC
comdlg32
GetSaveFileNameA
GetOpenFileNameA
shell32
ShellExecuteA
SHGetPathFromIDListA
SHGetFileInfoA
SHFileOperationA
SHBrowseForFolderA
ole32
CoTaskMemFree
CoInitializeEx
gdi32
DeleteObject
CreateBrushIndirect
SetBkColor
SelectObject
comctl32
InitCommonControlsEx
Sections
CODE Size: 24KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ