Static task
static1
Behavioral task
behavioral1
Sample
e5dff6da6b5ad6933a59d7d62ff9c699_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e5dff6da6b5ad6933a59d7d62ff9c699_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e5dff6da6b5ad6933a59d7d62ff9c699_JaffaCakes118
-
Size
374KB
-
MD5
e5dff6da6b5ad6933a59d7d62ff9c699
-
SHA1
9144d2847e93495c362bb01955a8da325288f453
-
SHA256
622bc8d9051a4d3cbbde029199aa1c4e0f376185d5c43645c187b344b458eefc
-
SHA512
cc47e1ea5361ea960c18893179aa6f7f2e776dcdd6923fa313cce1705f32831c5d1acb0c0be916516c03347b65a5ae6f50ec336c15ecc56fb8c14e1a9d96a857
-
SSDEEP
6144:Wcs0ZKB8pufhYHAk5Ey8FGilhdUYcV0RFJ+WV:Wcs0ZKipufhcumKhdbfES
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource e5dff6da6b5ad6933a59d7d62ff9c699_JaffaCakes118
Files
-
e5dff6da6b5ad6933a59d7d62ff9c699_JaffaCakes118.exe windows:4 windows x86 arch:x86
53527a499761f12ed6f0606630ace0bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetCancelConnection2A
WNetGetProviderNameA
kernel32
GetAtomNameA
GetExitCodeThread
GetStartupInfoA
GetModuleHandleA
EnumResourceNamesW
netapi32
NetServerEnum
msvcrt
_CIcos
mblen
__dllonexit
_onexit
asin
_putch
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
user32
IsDlgButtonChecked
MoveWindow
RegisterClassExW
GetMenu
ChildWindowFromPointEx
CharUpperW
GetDlgCtrlID
GetClipboardFormatNameW
GetWindowModuleFileNameA
CharUpperBuffW
CloseWindow
ReuseDDElParam
SendDlgItemMessageW
ShowCursor
MessageBeep
SendNotifyMessageW
ShowOwnedPopups
CreateWindowStationW
LoadStringW
IsChild
PostQuitMessage
CharLowerA
DrawStateA
GetMessageA
DestroyMenu
DrawFrameControl
CopyAcceleratorTableW
DispatchMessageA
DispatchMessageW
VkKeyScanExW
GetClipboardData
DdeAccessData
GetProcessWindowStation
GetSysColorBrush
OemToCharBuffA
IntersectRect
SetMenu
VkKeyScanW
GetMenuItemID
WaitMessage
GetNextDlgTabItem
RegisterWindowMessageA
ScrollWindowEx
DrawIconEx
KillTimer
PostMessageW
DrawTextA
GetCapture
SetWindowPlacement
SetClassLongW
IsWindow
LoadIconA
DrawIcon
GetClassNameA
CheckMenuItem
TranslateMDISysAccel
TranslateAcceleratorA
DdeQueryStringA
GetScrollInfo
GetDlgItemTextW
DefWindowProcA
GetWindowThreadProcessId
GetMessageExtraInfo
InvalidateRect
CharLowerBuffA
SetMenuDefaultItem
CharNextA
IsClipboardFormatAvailable
wvsprintfA
CheckRadioButton
CharPrevA
CopyIcon
SendInput
SetWindowPos
IsIconic
ScrollWindow
IsZoomed
DrawStateW
SetForegroundWindow
GrayStringW
SetWindowRgn
AppendMenuW
GetMenuState
PtInRect
MapDialogRect
ShowScrollBar
GetClassInfoA
CreateDialogIndirectParamA
GetParent
GetDlgItemTextA
TrackPopupMenuEx
CopyImage
GetKeyboardLayoutList
SetTimer
SetWindowTextW
TranslateAcceleratorW
CloseDesktop
UnhookWinEvent
RegisterClipboardFormatA
GetFocus
EnableScrollBar
IsDialogMessageA
ChangeClipboardChain
GetMenuItemCount
GetQueueStatus
WindowFromDC
DialogBoxIndirectParamW
ModifyMenuA
GetMessagePos
CloseClipboard
mouse_event
GetWindowWord
DdeClientTransaction
GetClassInfoW
DestroyAcceleratorTable
SetUserObjectSecurity
SendNotifyMessageA
IsWindowVisible
CharPrevW
InsertMenuA
GetWindowTextLengthA
GetSystemMetrics
DdeConnect
MapVirtualKeyExA
SetClipboardData
SetCaretBlinkTime
FrameRect
DrawTextW
FindWindowExA
GetCaretPos
BringWindowToTop
GetKeyboardLayoutNameW
SetClassLongA
LoadImageA
SetWindowLongW
ClipCursor
SetWindowTextA
DialogBoxParamA
GetLastActivePopup
SetCapture
LoadBitmapA
ShowCaret
DestroyCursor
IsCharAlphaW
SetDlgItemInt
CharLowerW
InsertMenuW
SetRectEmpty
LoadAcceleratorsA
CharUpperA
GetCursorPos
FillRect
DdeFreeStringHandle
BlockInput
ScreenToClient
GetSysColor
MapVirtualKeyW
GetKeyNameTextW
RemovePropA
GetDlgItem
CreateCursor
GetDlgItemInt
LoadCursorA
ChangeDisplaySettingsA
DefDlgProcA
GetDoubleClickTime
ReleaseDC
GetClipboardViewer
GetKeyboardState
CharNextW
SetScrollPos
CreateDialogParamA
UnionRect
advapi32
MakeSelfRelativeSD
DuplicateToken
GetSecurityDescriptorDacl
RevertToSelf
GetSecurityDescriptorGroup
SetSecurityDescriptorGroup
BuildExplicitAccessWithNameA
ImpersonateSelf
GetSecurityDescriptorControl
ImpersonateLoggedOnUser
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ