_D_bapN
Static task
static1
Behavioral task
behavioral1
Sample
d57e937a48ac621e14cd0841161ad29f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d57e937a48ac621e14cd0841161ad29f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d57e937a48ac621e14cd0841161ad29f_JaffaCakes118
-
Size
134KB
-
MD5
d57e937a48ac621e14cd0841161ad29f
-
SHA1
a201c9b79e832dbf37e794142b77e013de628f26
-
SHA256
9f93016ff0e5c4e60059b3bb22bc73a095bb32089f12d4c04c5dd102edc26a76
-
SHA512
c33e67ef290a1a3f4d9942613426b8a3a53ccccaa9d9a3db0230d09014fd7f3287cc0f67b72fc4a9053d6d388a999f0d833a19c9bd8f03a33490daf80eca6801
-
SSDEEP
3072:Akc4BYziNIsk6BBLoSP2kBN1kIXXrKiaSvgB98ue6somMTFsbXNrJE:TcUhL71cwR9gPuX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d57e937a48ac621e14cd0841161ad29f_JaffaCakes118
Files
-
d57e937a48ac621e14cd0841161ad29f_JaffaCakes118.exe windows:4 windows x86 arch:x86
9bf9e2a407cb544bd3ebf7e6b0ffb72a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHDeleteKeyA
SHGetValueA
kernel32
GetModuleHandleA
FindClose
GetTempPathA
SetThreadLocale
ReadFile
GlobalFindAtomA
GetStdHandle
CloseHandle
SetLastError
DeleteCriticalSection
GetDateFormatA
MulDiv
GetLocaleInfoA
FreeResource
lstrcpynA
GetThreadLocale
GetCPInfo
GetLastError
FreeLibrary
ResetEvent
LocalAlloc
SetEvent
GetVersion
lstrcatA
GetEnvironmentStrings
LoadResource
HeapAlloc
SetHandleCount
CreateEventA
SetFilePointer
MoveFileA
FormatMessageA
GlobalAlloc
CreateThread
GetCommandLineA
lstrcmpiA
WriteFile
InitializeCriticalSection
DeleteFileA
GetACP
GetStringTypeW
CreateFileA
GetFileSize
GetFullPathNameA
GlobalAddAtomA
HeapFree
SetEndOfFile
GlobalDeleteAtom
LoadLibraryA
GetCurrentProcess
VirtualAlloc
SetErrorMode
GetProcessHeap
LoadLibraryExA
SizeofResource
GetModuleFileNameA
LocalFree
RaiseException
WaitForSingleObject
GetSystemDefaultLangID
GetDiskFreeSpaceA
GetCommandLineW
GetProcAddress
gdi32
GetBitmapBits
SaveDC
CopyEnhMetaFileA
SetBkColor
GetDIBColorTable
SetPixel
GetRgnBox
user32
FillRect
IsDlgButtonChecked
IsDialogMessageW
GetForegroundWindow
BeginPaint
GetWindowPlacement
IsDialogMessageA
DrawEdge
EnumWindows
FrameRect
GetKeyboardType
LoadCursorA
InflateRect
SetFocus
SetWindowPos
WaitMessage
GetWindowTextA
UnregisterClassA
WindowFromPoint
RedrawWindow
MapVirtualKeyA
CharLowerA
SetWindowLongW
CharNextW
IntersectRect
SetClipboardData
IsWindowVisible
TrackPopupMenu
GetWindowDC
ReleaseCapture
SendMessageA
DestroyWindow
IsWindowEnabled
GetDlgItem
GetWindowRect
RegisterClassA
ActivateKeyboardLayout
GetClassNameA
SendMessageW
RemovePropA
IsIconic
GetCursor
SetWindowTextA
AdjustWindowRectEx
GetMenu
GetDC
IsChild
InvalidateRect
GetScrollInfo
SetCursor
TranslateMDISysAccel
GetSystemMetrics
GetPropA
MessageBoxA
DefFrameProcA
GetMenuItemInfoA
GetKeyboardLayoutNameA
IsZoomed
DrawIconEx
LoadBitmapA
ReleaseDC
DispatchMessageW
Exports
Exports
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 115KB - Virtual size: 230KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ