Static task
static1
Behavioral task
behavioral1
Sample
d10784736ec5715e2798aaf1bfb4cf7f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d10784736ec5715e2798aaf1bfb4cf7f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d10784736ec5715e2798aaf1bfb4cf7f_JaffaCakes118
-
Size
424KB
-
MD5
d10784736ec5715e2798aaf1bfb4cf7f
-
SHA1
b75bf606077c9f472800289c3808a0dae377dcb7
-
SHA256
841f9e1ee0c7a9c5037474fc08fc250367a68f8c155ea230041e899a0a3d6dcd
-
SHA512
3166cfc0659334c83003105f8f61c1327e61fdd5bc3ee1af52da55ca1efe2c0e9166aa140a9ccf56aced10d853424593b1bb7b21862a1b83741d49142adcf038
-
SSDEEP
6144:GwfPRh9Tc1X4y/IWnDy1HW3fxfkkhCFLwZ73cZt:9pTclbnDYWOkIcIt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d10784736ec5715e2798aaf1bfb4cf7f_JaffaCakes118
Files
-
d10784736ec5715e2798aaf1bfb4cf7f_JaffaCakes118.exe windows:4 windows x86 arch:x86
cc6c4b2dcc5701c534f260a93e4e8e36
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
CreatePropertySheetPageW
user32
DrawAnimatedRects
GetDCEx
InsertMenuA
DdeInitializeW
GetMessagePos
GetSystemMetrics
GetKeyState
GetListBoxInfo
GetSystemMenu
GetClipboardFormatNameW
GetLastActivePopup
TranslateMDISysAccel
EnumDisplaySettingsExA
GetGuiResources
EnumDisplayMonitors
SetScrollRange
IsCharUpperW
RegisterClassA
WINNLSEnableIME
GetClassInfoA
SubtractRect
SendIMEMessageExA
SetDeskWallpaper
OemToCharA
SetWindowPos
OpenClipboard
DdeUninitialize
CharToOemA
DdeSetUserHandle
GetCursorPos
DdeAccessData
MessageBoxA
CharUpperBuffA
ToUnicodeEx
TranslateAcceleratorW
SendNotifyMessageW
UnpackDDElParam
GetComboBoxInfo
SendDlgItemMessageW
InvalidateRect
SetWindowsHookExA
CloseWindow
GetIconInfo
SetMenuDefaultItem
GetInputDesktop
EnumDisplaySettingsA
CascadeWindows
GetDlgItem
WINNLSGetEnableStatus
ShowWindow
SetDlgItemInt
SetWinEventHook
IsDialogMessage
UnhookWindowsHook
KillTimer
DefWindowProcW
DestroyWindow
SetProcessDefaultLayout
MessageBoxW
LoadStringA
DdeClientTransaction
RegisterClassExA
MonitorFromPoint
GetUserObjectInformationA
CopyRect
ChangeMenuW
CreateWindowExW
BeginPaint
CharPrevExA
FillRect
CharUpperBuffW
GetClassLongW
CharToOemBuffW
kernel32
PulseEvent
InitializeCriticalSection
HeapCreate
ReadConsoleOutputA
ExitProcess
CloseHandle
GetUserDefaultLCID
ReadFile
OpenMutexA
GetTickCount
GetVersionExA
GetPrivateProfileIntW
GetModuleHandleA
VirtualAlloc
SetFilePointer
MultiByteToWideChar
TlsSetValue
TlsAlloc
GetOEMCP
GetLastError
FreeEnvironmentStringsA
GetStdHandle
FormatMessageW
HeapDestroy
GetTimeZoneInformation
InterlockedExchange
SetStdHandle
GetCurrentProcessId
GetCurrentProcess
LCMapStringW
GetModuleFileNameA
IsValidLocale
GetSystemInfo
GetStartupInfoA
GetEnvironmentStringsW
EnumSystemLocalesA
GetTimeFormatA
GetACP
GetCPInfo
HeapReAlloc
TerminateProcess
LoadLibraryA
GetCommandLineA
CompareStringW
IsBadWritePtr
SetLastError
ReadConsoleW
QueryPerformanceCounter
SetEnvironmentVariableA
CreateMutexA
UnhandledExceptionFilter
GetEnvironmentStrings
CompareStringA
VirtualFree
TlsGetValue
LeaveCriticalSection
IsValidCodePage
VirtualProtect
GetDateFormatW
RtlUnwind
HeapSize
WriteFile
SetHandleCount
HeapFree
FlushFileBuffers
GetStringTypeA
GetCurrentThreadId
EnterCriticalSection
TlsFree
GetSystemTimeAsFileTime
GetDateFormatA
WideCharToMultiByte
GetFileType
GetStringTypeW
GetLocaleInfoW
HeapAlloc
FreeEnvironmentStringsW
GetLocaleInfoA
DeleteCriticalSection
LCMapStringA
GetCurrentThread
VirtualQuery
GetProcAddress
Sections
.text Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ