Static task
static1
Behavioral task
behavioral1
Sample
d5ddeef96e9de1d1fdb3b4982daa256c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5ddeef96e9de1d1fdb3b4982daa256c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d5ddeef96e9de1d1fdb3b4982daa256c_JaffaCakes118
-
Size
33KB
-
MD5
d5ddeef96e9de1d1fdb3b4982daa256c
-
SHA1
467cbeb084f4443952bd76e390e9ff524e44d5b4
-
SHA256
5b727dae8fad53cdb59730a827bdff0f290997286991458ab6262bafce12d7e1
-
SHA512
4a048372791d46fe8ae400d36b6bf356a2d41ae4f96cc102015dca531ed9114f9f9dd86a0e8843d7008241c8923d7af6554bc65e31325bbd248c1b7b544a4ad8
-
SSDEEP
768:TGGofCc2nSF8OvnHz8Cl/G2LsS1GTAwWsMkRXhHc3bFK+lK+:T3oqcvWsHRkSypPXKLFK+lK+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d5ddeef96e9de1d1fdb3b4982daa256c_JaffaCakes118
Files
-
d5ddeef96e9de1d1fdb3b4982daa256c_JaffaCakes118.exe windows:2053 windows x86 arch:x86
6f4b4a24db749e203903814b4a9e1588
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalReAlloc
CreateFileA
GetProcAddress
MulDiv
TlsGetValue
InterlockedIncrement
Sleep
GetModuleFileNameA
EnterCriticalSection
RtlUnwind
GlobalDeleteAtom
CreateEventA
GetModuleFileNameA
LoadResource
InterlockedExchange
VirtualQuery
SetThreadLocale
GetFullPathNameA
InterlockedDecrement
VirtualAlloc
VirtualProtect
VirtualFree
GetLocaleInfoA
GetVersionExA
CloseHandle
FindClose
EnterCriticalSection
InitializeCriticalSection
FormatMessageA
GetThreadLocale
ResetEvent
SizeofResource
LeaveCriticalSection
LocalFree
lstrcpyA
GetStdHandle
InitializeCriticalSection
TlsGetValue
GetThreadLocale
LoadLibraryA
UnhandledExceptionFilter
CompareStringA
GetCommandLineA
GlobalHandle
GetStartupInfoA
GetProcAddress
GetLastError
GetCPInfo
SetErrorMode
GetCurrentThreadId
WideCharToMultiByte
GetCurrentProcessId
GetDiskFreeSpaceA
GetVersion
GetDateFormatA
VirtualQuery
GetCurrentThreadId
GetProcAddress
GetLocalTime
user32
GetWindow
GetClientRect
WinHelpA
MapWindowPoints
GetKeyNameTextA
CallWindowProcA
RemoveMenu
GetSysColorBrush
DispatchMessageA
SetTimer
InvalidateRect
FillRect
UpdateWindow
LoadStringA
GetForegroundWindow
BeginPaint
ReleaseCapture
GetParent
DefMDIChildProcA
SetMenuItemInfoA
GetWindowRect
EnableMenuItem
SetWindowPos
IsDialogMessageA
TranslateMessage
LoadCursorA
GetDesktopWindow
MessageBoxA
PostMessageA
GetLastActivePopup
CallNextHookEx
GetPropA
DeleteMenu
SetFocus
GetWindowDC
DrawIconEx
SetScrollRange
IntersectRect
EqualRect
SystemParametersInfoA
IsIconic
GetCapture
UnhookWindowsHook
LoadIconA
GetCursor
MessageBoxA
LoadStringA
CharToOemA
PeekMessageA
AdjustWindowRectEx
RegisterClassA
GetMenuItemInfoA
ReleaseDC
GetMenuItemID
CreateIcon
ClientToScreen
ScrollWindow
CheckMenuItem
ScreenToClient
GetMenuStringA
RemovePropA
GetMenuState
RedrawWindow
GetKeyboardLayoutList
PtInRect
GetKeyboardLayout
GetKeyboardType
PostQuitMessage
WaitMessage
LoadBitmapA
GetClassNameA
TrackPopupMenu
GetClassInfoA
IsRectEmpty
SetWindowsHookExA
EnableScrollBar
DrawFrameControl
GetSystemMenu
DestroyIcon
SetCapture
GetScrollPos
CreatePopupMenu
CharNextA
GetDC
UnregisterClassA
KillTimer
InsertMenuItemA
SetScrollPos
GetSystemMetrics
SetClassLongA
RegisterClipboardFormatA
GetMenu
MapVirtualKeyA
GetDCEx
IsWindow
ShowCursor
GetWindowTextA
SetCursor
GetSubMenu
GetMenuItemCount
gdi32
SetStretchBltMode
IntersectClipRect
ExcludeClipRect
SetWindowOrgEx
MoveToEx
GetDCOrgEx
CreateBrushIndirect
SelectPalette
GetPaletteEntries
CreateHalftonePalette
SetPixel
DeleteObject
SetViewportOrgEx
GetCurrentPositionEx
CreateBitmap
SaveDC
GetDeviceCaps
CreateCompatibleDC
SetBkMode
GetSystemPaletteEntries
CreatePalette
GetWindowOrgEx
DeleteDC
PatBlt
GetClipBox
BitBlt
RestoreDC
GetDIBits
CreateCompatibleBitmap
CreateFontIndirectA
SetBrushOrgEx
SelectObject
GetObjectA
CreateDIBSection
GetStockObject
GetTextExtentPoint32A
CreatePenIndirect
SetROP2
Sections
usfksd Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
masstf Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE