Static task
static1
Behavioral task
behavioral1
Sample
cf9f4a28995f149ec052ac044b785894_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf9f4a28995f149ec052ac044b785894_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cf9f4a28995f149ec052ac044b785894_JaffaCakes118
-
Size
173KB
-
MD5
cf9f4a28995f149ec052ac044b785894
-
SHA1
bcfc9cbea30c0d442a88a4e2b60110ec5b53fee5
-
SHA256
6d9064513498c38841d397ce3fc484838045bddc6784f24684e123a6c98bf61f
-
SHA512
24f1dd7eb0142c1a6d7cf6c8100a26cd50baf410852358afbd0597c199e9b26420bd2b1f2514b4ec70dab1a5d8d23d9ee8e2e25e38dd49670955dcf44cb17296
-
SSDEEP
3072:OLG7P6mfIApFwSa/UUP+Kve8VEFuC1tBJU/F7otsN88rvy0+Z2es8f3yuwa705tA:OLw6uI4mUUPLeJBU/utqvN+rKuwaoCp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf9f4a28995f149ec052ac044b785894_JaffaCakes118
Files
-
cf9f4a28995f149ec052ac044b785894_JaffaCakes118.exe windows:5 windows x86 arch:x86
171c055d2fefd077a5c76e87358d7890
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateCompatibleDC
SetDIBColorTable
GetViewportOrgEx
SetWindowExtEx
GetEnhMetaFileBits
GetDCOrgEx
CreateFontIndirectA
SetTextColor
LineTo
TextOutA
CreatePatternBrush
BitBlt
AbortDoc
ExcludeClipRect
GetSystemPaletteUse
SetStretchBltMode
GetPixel
RectVisible
SaveDC
GetDeviceCaps
OffsetRgn
GetPaletteEntries
user32
LoadImageA
MapDialogRect
GetClipboardFormatNameA
SetWindowLongA
SetClassLongA
EnumWindows
FrameRect
DrawIcon
GetUpdateRect
IsWindowEnabled
GetKeyboardLayout
GetWindowPlacement
RegisterWindowMessageA
ClientToScreen
MessageBoxA
SetWindowPlacement
GetClassInfoExA
GetScrollInfo
GetParent
RegisterClassW
CreateWindowExW
EnumDisplaySettingsA
PeekMessageA
GetKeyboardLayoutList
CreateMDIWindowW
SetWindowPos
DefWindowProcW
DefFrameProcA
MessageBeep
btwiimsg
_Poly
_LCosh
_FEps
_Nan
_Getctype
_LDtest
_Sinh
_Eps
_LXbig
ntdll
NtQueryInformationFile
NtSuspendThread
ZwCreateTimer
ZwSetEvent
NtProtectVirtualMemory
advapi32
RegOpenKeyA
RegOpenKeyExW
RegCloseKey
ole32
StgCreateDocfile
OleRegEnumFormatEtc
CreateFileMoniker
ProgIDFromCLSID
OleTranslateAccelerator
WriteClassStg
StringFromGUID2
WriteClassStm
CLSIDFromString
OleCreate
OleMetafilePictFromIconAndLabel
CoRegisterClassObject
OleQueryLinkFromData
OleSetClipboard
ReadClassStg
OleGetIconOfClass
CoFreeUnusedLibraries
RevokeDragDrop
kernel32
GetCurrentThreadId
GlobalReAlloc
EnterCriticalSection
VirtualFree
IsBadWritePtr
FormatMessageA
GetOEMCP
FileTimeToLocalFileTime
IsDBCSLeadByte
GetLocaleInfoA
SetPriorityClass
TlsGetValue
Sleep
InterlockedDecrement
GetFileAttributesW
CloseHandle
GlobalSize
VirtualFree
lstrcpyA
TlsAlloc
GetCurrentDirectoryW
FileTimeToDosDateTime
CloseHandle
GetCPInfo
HeapAlloc
GetCurrentDirectoryA
FreeLibrary
GetDateFormatA
FindResourceA
SetStdHandle
SetFilePointer
GetCommandLineW
GlobalAlloc
DeleteFileA
ResetEvent
OutputDebugStringW
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 167KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ