Static task
static1
Behavioral task
behavioral1
Sample
f60b07a36d9707666c13b454ea7c773a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f60b07a36d9707666c13b454ea7c773a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f60b07a36d9707666c13b454ea7c773a_JaffaCakes118
-
Size
173KB
-
MD5
f60b07a36d9707666c13b454ea7c773a
-
SHA1
5e41615afb0ef2851f41cc7294833c18345c36a6
-
SHA256
ba97263109e8d73cd0ebd9f9c30d30a7fd88f00ca702059b8780cca4beebe63f
-
SHA512
7bf78ec04c267227115596c381bae3cadd6281bda937031659de7d5b1eacc91592c37dea9001ee9a499d566cdcaccb49f163e858698d3982e6a9e9b82e878ba9
-
SSDEEP
3072:7JlcKd3X2FT4XW1LagWsalNBWsV8WsODzWsoihVfOD0WKZBWU:792NJ3y3BW2HgihVfAY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f60b07a36d9707666c13b454ea7c773a_JaffaCakes118
Files
-
f60b07a36d9707666c13b454ea7c773a_JaffaCakes118.exe windows:4 windows x86 arch:x86
f96d561f63e4b4615bf5057f5865e6f9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
sprintf
fclose
strlen
strcpy
strcat
memcpy
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
HeapAlloc
HeapFree
InitializeCriticalSection
FreeLibrary
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
DuplicateHandle
CloseHandle
CreatePipe
GetStdHandle
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
SetFileAttributesA
WriteFile
CreateFileA
SetFilePointer
HeapReAlloc
comctl32
InitCommonControls
InitCommonControlsEx
user32
DestroyWindow
GetWindow
SetActiveWindow
RemovePropA
SendMessageA
UnregisterClassA
DestroyAcceleratorTable
LoadIconA
LoadCursorA
SetCursorPos
LoadImageA
SetCursor
GetWindowLongA
GetParent
MapWindowPoints
MoveWindow
SystemParametersInfoA
GetWindowRect
GetSystemMetrics
GetKeyState
SetCapture
PostMessageA
GetCursorPos
ReleaseCapture
DestroyIcon
MessageBoxA
GetWindowThreadProcessId
IsWindowVisible
IsWindowEnabled
GetForegroundWindow
EnableWindow
EnumWindows
gdi32
CreateSolidBrush
CreatePen
DeleteObject
GetStockObject
GetObjectType
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
ole32
RevokeDragDrop
CoInitialize
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteExA
wsock32
closesocket
WSACleanup
WSAStartup
Sections
.code Size: 1024B - Virtual size: 701B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 51B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 70KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ