Static task
static1
Behavioral task
behavioral1
Sample
d4a22627517d9efcff76bffbe04dd6a9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d4a22627517d9efcff76bffbe04dd6a9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4a22627517d9efcff76bffbe04dd6a9_JaffaCakes118
-
Size
330KB
-
MD5
d4a22627517d9efcff76bffbe04dd6a9
-
SHA1
dd8ba832edbca60fbf11952aae3e8e0793613782
-
SHA256
8d75b6babcf54d8b7d2122ecc8237ea0780f19cb166d6732a02aab5529c9a66a
-
SHA512
74ffecb952d122dc80d0aefbc49898f29e7b5c81ab243c6cd6ed22e4a4721130ea3c16dd5a274fdd0d270d544edb3f98039447be601dd94108328e8760cbb5d9
-
SSDEEP
6144:OKy+s6HK1Ud3++g1PDascKC9ed7zzAFH7EC5:OB/Ud3ocKCYpwf5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4a22627517d9efcff76bffbe04dd6a9_JaffaCakes118
Files
-
d4a22627517d9efcff76bffbe04dd6a9_JaffaCakes118.exe windows:4 windows x86 arch:x86
29007b46ccfffdb2a7d086e68a5871cb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteExW
SHInvokePrinterCommandA
ExtractIconExA
DragQueryFile
user32
EnumPropsExW
EnumDisplaySettingsExW
DestroyMenu
InsertMenuW
GetTitleBarInfo
CharLowerW
GetScrollBarInfo
BeginDeferWindowPos
GetComboBoxInfo
ChangeDisplaySettingsExW
DdeQueryStringA
VkKeyScanExA
GetMessageW
EndPaint
CallWindowProcA
DestroyWindow
ShowWindow
SetDebugErrorLevel
RegisterClassExA
RealGetWindowClass
IsCharAlphaNumericW
FrameRect
IsZoomed
GetClipboardOwner
DialogBoxIndirectParamA
AdjustWindowRect
SetWindowTextW
MessageBoxW
CreateWindowExW
GetSysColorBrush
LoadImageA
GetPriorityClipboardFormat
OemToCharW
ScrollWindowEx
DrawAnimatedRects
CreateDesktopW
GetWindowPlacement
DefWindowProcW
RegisterClassA
GetNextDlgGroupItem
InvertRect
comctl32
ImageList_GetFlags
ImageList_GetBkColor
ImageList_AddIcon
DestroyPropertySheetPage
CreateMappedBitmap
ImageList_Destroy
ImageList_GetIconSize
InitCommonControlsEx
ImageList_BeginDrag
kernel32
CreateDirectoryExW
GetStringTypeExA
IsValidCodePage
GetLastError
SetHandleCount
UnlockFile
TlsGetValue
TlsAlloc
LCMapStringW
GetUserDefaultLCID
GetStartupInfoA
CreateMailslotW
GetVersionExA
SetFilePointer
CreateMutexA
GetCurrentProcessId
GetFileType
GlobalFree
IsBadWritePtr
SetCriticalSectionSpinCount
GetEnvironmentStringsW
VirtualFree
GetCurrentThread
OpenMutexA
UnhandledExceptionFilter
SetEnvironmentVariableA
LoadLibraryA
DeleteCriticalSection
GlobalUnlock
LeaveCriticalSection
GetCommandLineA
RtlUnwind
GetCurrentThreadId
GetFileAttributesExA
SetLastError
ReadFile
EnumResourceLanguagesW
GetDateFormatA
CompareStringA
ExitProcess
GetEnvironmentStrings
HeapSize
GetLocaleInfoA
GetSystemTimeAsFileTime
EnumSystemLocalesA
GlobalCompact
GetStringTypeA
HeapReAlloc
TlsSetValue
GetLocaleInfoW
HeapAlloc
InitializeCriticalSection
GetTickCount
GetOEMCP
GetSystemTime
VirtualProtect
CloseHandle
GetTimeFormatA
FreeEnvironmentStringsW
GetStdHandle
GetProcAddress
EnterCriticalSection
GetTempFileNameW
WideCharToMultiByte
GetModuleFileNameA
RaiseException
FlushFileBuffers
GetStringTypeW
EnumCalendarInfoExW
HeapFree
GetCPInfo
LCMapStringA
WriteFile
TlsFree
FreeEnvironmentStringsA
GetACP
InterlockedExchange
GetSystemInfo
GetProcAddress
SetStdHandle
GetTimeZoneInformation
HeapCreate
VirtualQuery
QueryPerformanceCounter
IsValidLocale
SetConsoleScreenBufferSize
TerminateProcess
GetModuleHandleA
SetThreadLocale
MultiByteToWideChar
HeapDestroy
VirtualAlloc
GetCurrentDirectoryA
CompareStringW
GetCurrentProcess
Sections
.text Size: 133KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ