Static task
static1
Behavioral task
behavioral1
Sample
d3f6774b7f5c8aedb5dd158d83fa9f19_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3f6774b7f5c8aedb5dd158d83fa9f19_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d3f6774b7f5c8aedb5dd158d83fa9f19_JaffaCakes118
-
Size
154KB
-
MD5
d3f6774b7f5c8aedb5dd158d83fa9f19
-
SHA1
e69e3e546a141e9fc2efade823e1c7ba0fabd101
-
SHA256
79208b9ec09eaf623e7d41e443c5c10e88503c76ce6622ca861678cff302d8dd
-
SHA512
551997c228e84497cd9a34ab16a599a906fe13640258aa892d96f2cb002e009f94ed461ceaeb10307ef0ddee18d567f89caa0ea97df748f5be08699ea250a77c
-
SSDEEP
3072:UzYHwPsESJbCV9amx8Y5m94wU0RQShlJa1s+ZKQPDZxLtxG2WhwQfIvKb:UMwk7CVomxLm9XFQSWd1LG1IvKb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3f6774b7f5c8aedb5dd158d83fa9f19_JaffaCakes118
Files
-
d3f6774b7f5c8aedb5dd158d83fa9f19_JaffaCakes118.exe windows:4 windows x86 arch:x86
353960d30ffa5f02f777b39b1806ead4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
ole32
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoUninitialize
CoInitialize
user32
RegisterClassExW
MapWindowPoints
GetClientRect
GetDC
SetWindowPos
GetWindowInfo
LoadCursorW
PeekMessageW
SystemParametersInfoW
GetDlgItemTextW
EndPaint
GetWindowTextLengthW
SetWindowTextW
GetDlgItem
DispatchMessageW
SetCapture
BeginPaint
CreateWindowExW
GetWindowRect
MessageBoxW
GetParent
DestroyWindow
SetDlgItemTextW
GetClassInfoExW
GetWindow
TranslateMessage
EndDialog
msvfw32
ICInfo
shell32
SHGetSpecialFolderLocation
ShellExecuteW
SHGetPathFromIDListW
gdi32
CreateFontIndirectW
GetDeviceCaps
DeleteObject
kernel32
LoadLibraryW
GetStartupInfoW
GetModuleHandleW
UnhandledExceptionFilter
HeapDestroy
HeapSize
HeapReAlloc
TlsSetValue
GetConsoleCP
RtlUnwind
GetVersionExA
WritePrivateProfileSectionW
LoadLibraryExW
GetACP
FindResourceW
GetSystemTimeAsFileTime
GetConsoleMode
GetVDMCurrentDirectories
LockResource
GetProcessHeap
WriteConsoleA
GetModuleHandleA
SetUnhandledExceptionFilter
GetOEMCP
LeaveCriticalSection
GetConsoleOutputCP
CopyFileW
WideCharToMultiByte
GetVersionExW
GetStringTypeW
WaitForSingleObject
GetCurrentProcess
CreateFileMappingW
GetProcessHandleCount
GetLocaleInfoA
GetStringTypeA
GetCurrentProcessId
GetLastError
SetLastError
VirtualFree
GetFileType
GetCommandLineW
GetDriveTypeW
GetModuleFileNameA
TlsFree
FlushFileBuffers
DeleteFileW
InterlockedIncrement
LoadResource
CreateProcessW
CloseHandle
GetEnvironmentStringsW
GetEnvironmentStrings
GetVersion
HeapFree
SizeofResource
InterlockedExchange
GetModuleFileNameW
InitializeCriticalSection
GetFileAttributesW
CreateSemaphoreW
CreateFileW
HeapAlloc
EnumResourceNamesA
GetFileSize
Sleep
lstrlenA
FreeEnvironmentStringsW
GetTickCount
GetStartupInfoA
lstrcmpiW
LCMapStringW
lstrcmpA
IsDebuggerPresent
GetThreadLocale
GetCPInfo
GetCommandLineA
InterlockedDecrement
DeleteCriticalSection
TlsGetValue
QueryPerformanceCounter
GetSystemDirectoryW
HeapCreate
FlushInstructionCache
RaiseException
WriteConsoleW
SetStdHandle
LCMapStringA
LocalFree
InterlockedCompareExchange
FreeEnvironmentStringsA
ExitProcess
GetProcAddress
GetCurrentThreadId
GetStdHandle
LoadLibraryA
TlsAlloc
ReadFile
LocalAlloc
SetFilePointer
FreeLibrary
SetHandleCount
MulDiv
CreateFileA
IsProcessorFeaturePresent
WriteFile
VirtualAlloc
lstrlenW
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
Sections
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idive Size: 1024B - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ