Static task
static1
Behavioral task
behavioral1
Sample
f72a326d247316e1c826d2c0cae780c8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f72a326d247316e1c826d2c0cae780c8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f72a326d247316e1c826d2c0cae780c8_JaffaCakes118
-
Size
327KB
-
MD5
f72a326d247316e1c826d2c0cae780c8
-
SHA1
268f72ad3bbd19c1140261f292e5da17f52d667a
-
SHA256
be5a5e31148562eb50fa7cdf77c6043c3514ea1b1407fdd37304fcd1a7263cbf
-
SHA512
132fdbc0874984f1e41cd461eaee51002a48e0bfcc278009037a1520c53d659fcfda27a7508e669eac44f41f091819d74287eccacfc52f97030f3dcf8da77dda
-
SSDEEP
6144:Drj+CZNTRxpO8NwYIhLuTi2a8Q1jtxiUHCBDQyjhMCylZFThAUU:Drj+C5fQYIJuTG8wtzSkyjLkVA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f72a326d247316e1c826d2c0cae780c8_JaffaCakes118
Files
-
f72a326d247316e1c826d2c0cae780c8_JaffaCakes118.exe windows:4 windows x86 arch:x86
a3cc2da8a9a6faf04f70d88a107f0f3d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
OpenClipboard
GetDlgItem
CreateWindowExA
SetClipboardData
MessageBoxIndirectA
GetClientRect
SetTimer
GetSysColor
SetDlgItemTextA
GetMessagePos
FindWindowExA
GetSystemMetrics
DialogBoxParamA
InvalidateRect
ScreenToClient
EnumWindowStationsW
DestroyWindow
CreatePopupMenu
EndPaint
SetWindowPos
IsWindowVisible
CheckDlgButton
FillRect
TrackPopupMenu
SendMessageA
DefWindowProcA
wsprintfA
DispatchMessageA
AppendMenuA
SetForegroundWindow
SetCursor
CharPrevA
SendMessageTimeoutA
SetClassLongA
LoadBitmapA
IsWindow
ShowWindow
BeginPaint
DrawTextA
SystemParametersInfoA
SetWindowLongA
LoadImageA
GetSystemMenu
GetDlgItemTextA
GetClassInfoA
GetDC
CharNextA
PostQuitMessage
EmptyClipboard
GetWindowLongA
SetWindowTextA
EnableMenuItem
CreateDialogParamA
LoadCursorA
GetWindowRect
EnableWindow
CallWindowProcA
CloseClipboard
RegisterClassA
IsWindowEnabled
PeekMessageA
ExitWindowsEx
EndDialog
shlwapi
PathFindFileNameA
PathFindExtensionA
oleacc
CreateStdAccessibleObject
LresultFromObject
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
urlmon
RegisterBindStatusCallback
CoInternetCreateSecurityManager
CreateURLMonikerEx
advapi32
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
RegCloseKey
RegEnumKeyA
RegDeleteKeyA
RegEnumValueA
RegQueryValueExA
shell32
SHGetFileInfoA
ShellExecuteA
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHFileOperationA
SHGetPathFromIDListA
gdi32
CreateFontIndirectA
SelectObject
CreateBrushIndirect
GetDeviceCaps
DeleteObject
SetTextColor
SetBkMode
SetBkColor
comctl32
ImageList_Create
ImageList_Destroy
ImageList_AddMasked
kernel32
MulDiv
FreeLibrary
GetProcessAffinityMask
GetModuleHandleA
SetCommBreak
LoadLibraryExA
GetWindowsDirectoryA
GetExitCodeProcess
DeleteFileA
MultiByteToWideChar
FindNextFileA
SetFilePointer
GetPrivateProfileStringA
ExitProcess
GetProcAddress
FindFirstFileA
FindClose
WriteFile
ReadFile
WritePrivateProfileStringA
WaitForSingleObject
Sections
.text Size: 190KB - Virtual size: 189KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 5KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ