Static task
static1
Behavioral task
behavioral1
Sample
dba89a411a9d954cbfef855dd16b045b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dba89a411a9d954cbfef855dd16b045b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dba89a411a9d954cbfef855dd16b045b_JaffaCakes118
-
Size
176KB
-
MD5
dba89a411a9d954cbfef855dd16b045b
-
SHA1
aa5f3023de39d8498dd47645963f932a563b752b
-
SHA256
376e15b83fef75d0a7034a2ebb92e8bbdc249593aa7686ea8ebff91b52582106
-
SHA512
8be25407ab7abff4d7d0234454e1db9d6da4ce770d65348434eca2ae14b035fb1e38ef5b25fc992a12ecc35b83481b63befa438095eb715c4110329f199417d5
-
SSDEEP
3072:HMy55HT3+S7oKZI4ptVmzMRDzNXleD5vQ7UjsvIoF/TN/Qw/+UX+F:LuMoKzptszsD6D5Y7rRx/XE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dba89a411a9d954cbfef855dd16b045b_JaffaCakes118
Files
-
dba89a411a9d954cbfef855dd16b045b_JaffaCakes118.exe windows:4 windows x86 arch:x86
b5f720642e2c60365eedf7385f7e2bdd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenMutexA
GetExitCodeProcess
Sleep
TerminateProcess
FindClose
FindFirstFileA
GetCurrentDirectoryA
GetModuleFileNameA
SetEndOfFile
CompareStringW
CompareStringA
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
SetFilePointer
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
CreateMutexA
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
CreateEventA
WaitForSingleObject
WaitForMultipleObjectsEx
CreateThread
GetCurrentThread
SetEnvironmentVariableA
MulDiv
LocalAlloc
WriteFile
ReadFile
GetFileSize
CreateFileA
ResetEvent
GetCurrentProcess
DuplicateHandle
GetLastError
OutputDebugStringA
SuspendThread
CreateProcessA
ResumeThread
WriteProcessMemory
OpenProcess
GetEnvironmentVariableA
RtlUnwind
HeapSize
CloseHandle
HeapReAlloc
GetVersion
GetCommandLineA
FormatMessageA
VirtualAlloc
LocalFree
ReadProcessMemory
SetCurrentDirectoryA
DeleteFileA
SetFileAttributesA
FindNextFileA
MoveFileA
RemoveDirectoryA
GetProcAddress
FreeLibrary
LoadLibraryA
HeapFree
HeapAlloc
ExitProcess
GetModuleHandleA
GetStartupInfoA
user32
SetForegroundWindow
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
UpdateWindow
PeekMessageA
TranslateMessage
DispatchMessageA
BeginPaint
EndPaint
DefWindowProcA
GetClientRect
SetWindowTextA
MessageBeep
GetWindowRect
SendMessageTimeoutA
IsWindowVisible
ShowWindow
PostMessageA
BringWindowToTop
AdjustWindowRectEx
IsIconic
SystemParametersInfoA
MoveWindow
MessageBoxA
GetTabbedTextExtentA
GetDC
ReleaseDC
GetDesktopWindow
GetActiveWindow
wsprintfA
GetForegroundWindow
GetWindowThreadProcessId
GetWindowLongA
EnumThreadWindows
EnumWindows
gdi32
GetObjectA
BitBlt
CreateCompatibleDC
DeleteDC
CreateSolidBrush
CreatePen
Rectangle
SetBkMode
LPtoDP
SetTextColor
TextOutA
CreateFontA
SelectObject
DeleteObject
CreateDIBSection
advapi32
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptImportKey
CryptVerifySignatureA
CryptDestroyKey
CryptDestroyHash
CryptReleaseContext
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
winmm
timeGetTime
raw_005.wdt
?EnableActivityTracker@@YA_N_N@Z
?IsActivityTrackerEnabled@@YA_NXZ
?ResetActivityCheck@@YAXXZ
?HasBeenActivitySinceLastReset@@YA_NXZ
imagehlp
UnMapAndLoad
MapAndLoad
comctl32
_TrackMouseEvent
Sections
.text Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 24KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FFF Size: 256B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE