Static task
static1
Behavioral task
behavioral1
Sample
d0ea351e9544e2643b9fed48d31ad28b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d0ea351e9544e2643b9fed48d31ad28b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d0ea351e9544e2643b9fed48d31ad28b_JaffaCakes118
-
Size
86KB
-
MD5
d0ea351e9544e2643b9fed48d31ad28b
-
SHA1
f7c515e104ca5a58fc41d08fee1e02c70365df28
-
SHA256
e1751389a48a37400dde0c2e798f588f01561265ca3ba2beaa73e158ee482d1e
-
SHA512
b56ad2933de7a78fc5143036f54c92f27dffade2bbf27bb26176d19eee9b8c9e9967e02a5c05a3af14e3a12796286a69ad0c195dd8ec668b2c9ec8d136d7d036
-
SSDEEP
1536:MCoolAW0ZGSR8vqMEsXV1N89PuxsKtyGosGr6NOuatyFSIuJk13HnG:MCn1TvKaNVeKt46QuPUJk13m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d0ea351e9544e2643b9fed48d31ad28b_JaffaCakes118
Files
-
d0ea351e9544e2643b9fed48d31ad28b_JaffaCakes118.exe windows:4 windows x86 arch:x86
1d8a86b17ae41ccffe3154fb7fd372e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
GetMessageA
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
SetWindowPos
FrameRect
EnumWindows
EqualRect
GetScrollPos
PostQuitMessage
SetWindowTextA
GetSubMenu
EnableMenuItem
kernel32
ExitProcess
GetACP
SetUnhandledExceptionFilter
GetStartupInfoA
FileTimeToSystemTime
GetSystemTime
GetOEMCP
VirtualAllocEx
GetCurrentProcessId
GetTimeZoneInformation
RtlUnwind
QueryPerformanceCounter
GetFileAttributesA
GetTempPathA
GetThreadLocale
GetTickCount
InterlockedExchange
gdi32
CreateCompatibleBitmap
ExcludeClipRect
FillRgn
DPtoLP
GetMapMode
CopyEnhMetaFileA
SetViewportExtEx
CreateICW
SelectClipPath
ole32
StgOpenStorage
CoRevokeClassObject
DoDragDrop
CoCreateInstance
OleRun
StringFromGUID2
CoInitialize
CoInitializeSecurity
CoTaskMemRealloc
advapi32
RegQueryValueExW
RegCreateKeyExW
AdjustTokenPrivileges
FreeSid
GetUserNameA
RegCreateKeyA
GetSecurityDescriptorDacl
QueryServiceStatus
CryptHashData
CheckTokenMembership
msvcrt
_mbscmp
fflush
__setusermatherr
strncpy
puts
_fdopen
__getmainargs
iswspace
_CIpow
_strdup
_lock
fprintf
raise
__initenv
strlen
signal
strcspn
_flsbuf
comctl32
ImageList_LoadImageW
ImageList_ReplaceIcon
ImageList_LoadImageA
ImageList_GetBkColor
CreatePropertySheetPageA
InitCommonControls
ImageList_DragEnter
ImageList_SetIconSize
ImageList_GetIcon
ImageList_Destroy
ImageList_DrawEx
ImageList_GetIconSize
ImageList_Write
shell32
ExtractIconW
DragAcceptFiles
ExtractIconExW
DragQueryFileW
SHGetPathFromIDList
ShellExecuteEx
DoEnvironmentSubstW
SHBrowseForFolderA
ShellExecuteW
DragQueryFileA
CommandLineToArgvW
oleaut32
SafeArrayPtrOfIndex
SafeArrayRedim
SysReAllocStringLen
SafeArrayUnaccessData
SafeArrayPutElement
SafeArrayCreate
VariantCopy
SafeArrayGetUBound
Sections
.text Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ