Static task
static1
Behavioral task
behavioral1
Sample
efc9de5f314815979f054a1b7e41573b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efc9de5f314815979f054a1b7e41573b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
efc9de5f314815979f054a1b7e41573b_JaffaCakes118
-
Size
110KB
-
MD5
efc9de5f314815979f054a1b7e41573b
-
SHA1
f744bd01081bf4d4c945b799c34dcbf248fbfc4a
-
SHA256
51c489fe0a66e7116fa1a5400fc657349f1f3af15c070563df7495e7617dedca
-
SHA512
5c605d240faad89d9fc26934b2c2d812d4d0666019bf04eb9768ec49616ae1864cc968bd3279e3309c67dc3b01b90832ff2229b090d20d454b7fdefbbb0e6682
-
SSDEEP
3072:qTLituRA0m03jPhpwPK8SyZm6WF/ZR/9YB0g:10FP7mBSl6eR/9Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource efc9de5f314815979f054a1b7e41573b_JaffaCakes118
Files
-
efc9de5f314815979f054a1b7e41573b_JaffaCakes118.exe windows:4 windows x86 arch:x86
892cc62a9cd22e645e3eb804a60ab5e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
SafeArrayCreate
SafeArrayGetUBound
RegisterTypeLib
SafeArrayUnaccessData
OleLoadPicture
VariantChangeType
user32
GetWindowThreadProcessId
EndPaint
GetCapture
OpenClipboard
CharLowerBuffA
MessageBeep
SetClipboardData
DrawIconEx
ActivateKeyboardLayout
LoadStringA
InsertMenuItemA
DestroyWindow
ChildWindowFromPoint
SetWindowLongW
SetClassLongA
SetScrollRange
GetKeyState
FindWindowA
MsgWaitForMultipleObjects
IsWindowEnabled
GetMenuItemID
DrawMenuBar
GetActiveWindow
GetKeyboardState
GetCursor
WindowFromPoint
IsIconic
SetPropA
GetMenuItemInfoA
GetClipboardData
CloseClipboard
SetTimer
DestroyMenu
GetWindowDC
IsRectEmpty
ScreenToClient
SendMessageA
PtInRect
GetMenu
GetParent
TranslateMDISysAccel
GetTopWindow
CallNextHookEx
UpdateWindow
SetParent
ReleaseDC
RegisterClassA
GetClassLongA
SystemParametersInfoA
GetMenuItemCount
GetDC
GetWindowLongA
GetWindowTextA
GetClassInfoA
DestroyCursor
SetWindowTextA
BeginPaint
IsZoomed
GetClientRect
IsWindowVisible
GetClassNameA
CharLowerA
GetCursorPos
OffsetRect
GetKeyboardLayoutList
AdjustWindowRectEx
GetLastActivePopup
EnumChildWindows
LoadCursorA
SetRect
SetWindowsHookExA
GetKeyboardLayout
DrawTextA
GetSysColorBrush
DrawAnimatedRects
GetPropA
CreatePopupMenu
CharToOemA
GetSysColor
MoveWindow
IsDialogMessageW
DispatchMessageW
DrawEdge
GetWindowPlacement
GetWindowLongW
GetFocus
CharNextA
GetScrollRange
GetDCEx
GetScrollPos
WaitMessage
EnableMenuItem
EmptyClipboard
UnregisterClassA
RegisterWindowMessageA
GetMenuStringA
IsWindow
GetForegroundWindow
MessageBoxA
ole32
WriteClassStm
MkParseDisplayName
CoGetMalloc
CoReleaseMarshalData
CreateBindCtx
CoCreateInstanceEx
CoRegisterClassObject
CoTaskMemFree
CoRevokeClassObject
CoDisconnectObject
version
VerQueryValueA
GetFileVersionInfoA
VerFindFileA
shell32
SHGetFileInfoA
Shell_NotifyIconA
DragQueryFileA
gdi32
GetBitmapBits
SelectPalette
CreateBitmap
SetBkColor
SaveDC
GetPaletteEntries
CreatePalette
BitBlt
GetDIBits
kernel32
SetEvent
ExitProcess
GetModuleHandleA
GetLocalTime
VirtualAllocEx
Sleep
GetFileType
GetLastError
lstrlenA
GetCPInfo
lstrcatA
ExitThread
LockResource
LocalFree
GlobalAlloc
WriteFile
GetProcAddress
Sections
CODE Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE