Static task
static1
Behavioral task
behavioral1
Sample
d18dcee1ba6c13f82438d1f2eb55cef4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d18dcee1ba6c13f82438d1f2eb55cef4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d18dcee1ba6c13f82438d1f2eb55cef4_JaffaCakes118
-
Size
23KB
-
MD5
d18dcee1ba6c13f82438d1f2eb55cef4
-
SHA1
56bea42872ff7660122471d5ab31e6cf03f14cac
-
SHA256
530d9c710a8434a151ed4d4b270a3bef1278a9b57414413914c382aebfa5ba6b
-
SHA512
003ff9f12aeced6fabcce8859f06cfcb5dae26e7572bbbd6e960eceaea1c6054d3cb69d838539545ae6851a2f73d5c26c55f98f07dddc8431ecf63054c95be73
-
SSDEEP
384:j5Fu8E1KZgpw4Kkm8DeO22S3JqDtMd6XaNslXF+Y3ZfP0Y3ZfPi5F//zKs:94IOwYS3YDHKN4X7vAms
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d18dcee1ba6c13f82438d1f2eb55cef4_JaffaCakes118
Files
-
d18dcee1ba6c13f82438d1f2eb55cef4_JaffaCakes118.exe windows:5 windows x86 arch:x86
ab57e93c950ad3e7bb5e56b76c67e399
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
opengl32
glTexCoord3fv
glVertex4iv
glCullFace
glTexCoord4sv
glLightModelfv
glPointSize
glClear
glTexImage1D
glEvalCoord1dv
glLineWidth
glInterleavedArrays
glMapGrid1f
wglSetPixelFormat
user32
MapVirtualKeyExA
GetCursorInfo
SetWindowTextW
GetAltTabInfoA
GetCursorFrameInfo
EnableMenuItem
GetWindowTextW
ExcludeUpdateRgn
SetSystemCursor
MonitorFromPoint
SetShellWindowEx
DrawFrame
DrawAnimatedRects
CreateDesktopA
SetMenu
kernel32
GetCurrentDirectoryA
GetConsoleProcessList
SetStdHandle
RegisterWowBaseHandlers
RequestDeviceWakeup
GetSystemDirectoryA
VirtualAlloc
GetCurrentProcessId
GetNumberOfConsoleMouseButtons
GetConsoleAliasesLengthA
GetTickCount
FoldStringW
GetConsoleFontInfo
QueryPerformanceCounter
CreateEventA
AssignProcessToJobObject
CommConfigDialogA
DisableThreadLibraryCalls
GetCurrentThreadId
SetThreadExecutionState
GetConsoleCP
DeactivateActCtx
dmdskmgr
?ContainsSystemPartition@CDMNodeObj@@QAEHXZ
?IsInFlux@CDMNodeObj@@QAEHXZ
?GetDiskCookies@CTaskData@@QAEXAAKPAPAJHKH@Z
?GetFileSystemType@CDMNodeObj@@QAEHXZ
DllGetClassObject
LoadPropertyPageData
?GetIconId@CDMNodeObj@@QAEIH@Z
?GetUnallocSpace@CDMNodeObj@@QAE_JH@Z
?FindRegionPtrFromRegionId@CTaskData@@QAEH_JPAPAVCDMNodeObj@@@Z
?IsOemPartition@CDMNodeObj@@QAEHXZ
?IsNEC_98Disk@CDMNodeObj@@QAEHXZ
?ContainsESPPartition@CDMNodeObj@@QAEHXZ
?CanHaveGPT@CDMNodeObj@@QAEHXZ
?ContainsSystemInformation@CDMNodeObj@@QAEHXZ
?GetImageNum@CDMNodeObj@@QAEHXZ
odfox32
ConfigDSNW
mfcsubs
??YCString@@QAEABV0@PBG@Z
??H@YG?AVCString@@PBGABV0@@Z
??ACStringArray@@QBE?AVCString@@H@Z
?MakeUpper@CString@@QAEXXZ
?Create@CPlex@@SGPAU1@AAPAU1@II@Z
??8@YG_NPBGABVCString@@@Z
??_7CMapStringToPtr@@6B@
??BCCriticalSection@@QAEPAU_RTL_CRITICAL_SECTION@@XZ
?FreeAssoc@CMapStringToPtr@@IAEXPAUCAssoc@1@@Z
??_7CStringArray@@6B@
?AfxA2WHelper@@YGPAGPAGPBDH@Z
?AfxGetEmptyString@@YGABVCString@@XZ
?ReleaseBuffer@CString@@QAEXH@Z
??1CStringArray@@UAE@XZ
?GetAllocLength@CString@@QBEHXZ
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 663B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 961B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ