Static task
static1
Behavioral task
behavioral1
Sample
d2f9a373d0fcd81aa53075b55cb36848_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2f9a373d0fcd81aa53075b55cb36848_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d2f9a373d0fcd81aa53075b55cb36848_JaffaCakes118
-
Size
260KB
-
MD5
d2f9a373d0fcd81aa53075b55cb36848
-
SHA1
f3e432902080e94b138f20595130a22b45ed1565
-
SHA256
1acdc4237e36f4352c23fb289f9637704a04e20e96b3c9918e1767e63488355b
-
SHA512
0a9cd23b6a8ada75fd34648e3c240a1100fc607ec74308818e67a0d5c31bc4fe4f09bfa121dc8dc4dc36539e814304481438259d49a2c0054918d0a7c117e560
-
SSDEEP
3072:eH9jWH3XTrIw3yesAeAVoaMzaFOTCMtOe0qUcGDhj8ddvd9QaB:eHIH/P3GAWmkfpNQhgf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d2f9a373d0fcd81aa53075b55cb36848_JaffaCakes118
Files
-
d2f9a373d0fcd81aa53075b55cb36848_JaffaCakes118.exe windows:4 windows x86 arch:x86
63be01955411bc604185d2c4a5ac005a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetTapeParameters
GetThreadLocale
GetStdHandle
SetConsoleTitleA
OpenWaitableTimerA
OutputDebugStringA
lstrcpyA
GetThreadPriority
ExpandEnvironmentStringsA
FlushViewOfFile
GetConsoleCommandHistoryA
GetConsoleTitleA
OpenSemaphoreA
GetFileAttributesExA
GetPrivateProfileStructA
OpenJobObjectA
ExitThread
GetConsoleHardwareState
WriteConsoleOutputAttribute
SetProcessPriorityBoost
SetFilePointer
GetLocalTime
GlobalDeleteAtom
ReadConsoleA
SystemTimeToTzSpecificLocalTime
GetWriteWatch
FatalExit
ExitProcess
VirtualAllocEx
SetFileAttributesA
HeapSize
EnumSystemLanguageGroupsA
GetProfileIntA
WriteProcessMemory
LZStart
GetFileAttributesA
GetConsoleMode
CreateNamedPipeA
GetOEMCP
GetThreadPriorityBoost
OpenWaitableTimerA
GetConsoleOutputCP
WriteProfileSectionA
EnumResourceLanguagesA
GetDllDirectoryA
GetStartupInfoA
VirtualAllocEx
HeapReAlloc
ConvertDefaultLocale
GetProcessWorkingSetSize
TermsrvAppInstallMode
ReadFile
GetCommState
LZRead
lstrcpynA
SetInformationJobObject
GetFileSize
SetCommTimeouts
OpenEventA
SetFileValidData
GetFileType
MapUserPhysicalPages
GetSystemRegistryQuota
UpdateResourceA
GetConsoleCursorMode
GetCurrencyFormatA
GetCurrentProcess
Thread32Next
SetCalendarInfoA
ProcessIdToSessionId
GlobalSize
SetConsoleKeyShortcuts
PurgeComm
GlobalWire
_lclose
BuildCommDCBAndTimeoutsA
ResumeThread
GetConsoleInputExeNameA
GetSystemWindowsDirectoryA
GetWindowsDirectoryA
IsValidCodePage
Sleep
DeleteTimerQueueTimer
OpenMutexA
IsBadCodePtr
GetFileAttributesExA
HeapSize
GetExitCodeThread
IsProcessorFeaturePresent
WriteProcessMemory
winmm
timeGetSystemTime
user32
SetRect
EnumWindows
OemToCharBuffA
FlashWindow
OpenClipboard
UpdateLayeredWindow
SwitchToThisWindow
IsZoomed
ChildWindowFromPointEx
DefWindowProcA
CharNextExA
SetCursorPos
RemoveMenu
RegisterClassExW
SetShellWindowEx
SetForegroundWindow
FillRect
SystemParametersInfoA
DrawTextA
SetRect
GetKeyNameTextA
GetWindowDC
ChangeDisplaySettingsExA
TrackPopupMenuEx
GetSubMenu
ClientThreadSetup
GetTabbedTextExtentA
GetKeyboardLayoutNameA
SetCaretBlinkTime
UnhookWinEvent
EnumDisplaySettingsA
OpenWindowStationA
DlgDirSelectExA
GetSystemMenu
SetCursorPos
IsChild
PrintWindow
SetLastErrorEx
SetDeskWallpaper
GetClipboardSequenceNumber
ToAsciiEx
InsertMenuItemW
SetMenuItemInfoA
SetCapture
LoadBitmapA
LoadIconA
MessageBoxTimeoutA
EnumDisplayDevicesA
IsCharAlphaNumericA
GetPropA
SetKeyboardState
IsWindow
DlgDirSelectExA
CreateMDIWindowA
GetTabbedTextExtentA
SetWindowsHookA
DeferWindowPos
EnumDesktopWindows
GetSystemMetrics
MapVirtualKeyA
MapVirtualKeyExA
GetMenuItemInfoA
OpenDesktopA
RegisterShellHookWindow
GetLastActivePopup
TileChildWindows
OemToCharBuffA
CalcMenuBar
GetClassInfoExA
DefDlgProcA
SetWindowTextA
GetPropA
CharNextA
OemToCharA
OpenClipboard
SetProgmanWindow
PrivateExtractIconsA
UnlockWindowStation
RealGetWindowClassA
PostThreadMessageA
GetMenuState
GetWindowTextA
HiliteMenuItem
GetKeyState
SetMessageQueue
Sections
.idata Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.itext Size: 244KB - Virtual size: 514KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ