Static task
static1
Behavioral task
behavioral1
Sample
ded979699bbee2705472e3aeb03639b8_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ded979699bbee2705472e3aeb03639b8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ded979699bbee2705472e3aeb03639b8_JaffaCakes118
-
Size
236KB
-
MD5
ded979699bbee2705472e3aeb03639b8
-
SHA1
ce1e35d256ee84a66bf9a5b37e26206f36779227
-
SHA256
7cb3363e0d6d1ae3cb50d9129f52991e85f65c1f57b2fed1e872a230fb5d58a9
-
SHA512
e319d73f045e311b518fa4a85c2deeb4eef2ec292fe70d315119609a6070a5debd503b36fa9de7a8d98765bb11db13c9c21240acf81db20ae0766ba18dbc2910
-
SSDEEP
3072:yEH2qGmZJ7cIuyjPpBIZRPEGWnC1eX/Zr5tNh1G1L5hom18OrF3RQQYr27baKFjJ:yEJZJ71tjOLeV5ThAim1Fh37YS7bXj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ded979699bbee2705472e3aeb03639b8_JaffaCakes118
Files
-
ded979699bbee2705472e3aeb03639b8_JaffaCakes118.exe windows:4 windows x86 arch:x86
4fefbe715865167d151201d722127ba2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
user32
GetScrollInfo
RegisterClassA
CharNextA
LoadKeyboardLayoutA
GetSubMenu
GetParent
GetWindowRect
GetDesktopWindow
SetMenu
KillTimer
GetSysColor
SetForegroundWindow
ActivateKeyboardLayout
MessageBeep
CreatePopupMenu
GetWindowThreadProcessId
MsgWaitForMultipleObjects
IsIconic
GetSystemMenu
EnumWindows
CharLowerBuffA
GetDCEx
DrawEdge
EnumThreadWindows
OemToCharA
LoadCursorA
GetWindowPlacement
GetMenuItemCount
SetRect
GetMenuState
GetDC
CloseClipboard
OpenClipboard
SetMenuItemInfoA
GetMessagePos
GetKeyState
SetScrollRange
ShowWindow
SetWindowPos
DrawTextA
GetScrollRange
GetKeyboardLayout
TranslateMDISysAccel
FrameRect
MessageBoxA
IsWindow
CallNextHookEx
BeginPaint
DestroyWindow
SetParent
ReleaseDC
GetSysColorBrush
DeleteMenu
SetWindowsHookExA
GetKeyboardLayoutNameA
GetKeyboardType
GetCursorPos
CharUpperBuffA
ScrollWindow
SendMessageA
SetWindowLongW
IntersectRect
GetWindowDC
WindowFromPoint
RedrawWindow
FillRect
OffsetRect
GetWindowTextA
GetWindow
LoadStringA
SetActiveWindow
SetClipboardData
GetTopWindow
UnregisterClassA
RegisterWindowMessageA
PeekMessageA
EnableWindow
GetScrollPos
EmptyClipboard
LoadBitmapA
TranslateMessage
kernel32
GetModuleHandleA
GetProcAddress
LocalAlloc
GetLastError
GetACP
ExitProcess
IsBadHugeReadPtr
GetCommandLineA
GetVersionExA
VirtualAllocEx
VirtualAlloc
LoadLibraryA
lstrlenW
shell32
Shell_NotifyIconA
gdi32
CreateDIBSection
GetObjectA
GetRgnBox
CreateDIBitmap
SelectObject
SetPixel
Sections
.text Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
RES6 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RES9 Size: 1024B - Virtual size: 654B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RES5 Size: 512B - Virtual size: 332B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
RES1 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
RES8 Size: 512B - Virtual size: 401B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RES0 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
RES3 Size: 1024B - Virtual size: 616B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ