Static task
static1
Behavioral task
behavioral1
Sample
ff1bff0d60a28fe4bb26d84119ae4913_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff1bff0d60a28fe4bb26d84119ae4913_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ff1bff0d60a28fe4bb26d84119ae4913_JaffaCakes118
-
Size
519KB
-
MD5
ff1bff0d60a28fe4bb26d84119ae4913
-
SHA1
2998ebe278009394a72c866ee3e1131bd2c88746
-
SHA256
9715e83a4fedee1ff40375e5e6954677707af18a50b7bfa87c1168183a9a16d1
-
SHA512
eb1a7aee3b2a75f6b0192972e4ec45acb5405b5b14a3b488b4b41353e27f5ecee3cab44f42bed38591b7103e9205d3734f169b78264198a395d73b91de69a24a
-
SSDEEP
12288:uY1AUfMOI1bLNsvcEWvdGMEfgC+HFgYDCwHmdpJVa6Ej:uY1A22bYWVnEfJ+lgdwHmdpza3j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ff1bff0d60a28fe4bb26d84119ae4913_JaffaCakes118
Files
-
ff1bff0d60a28fe4bb26d84119ae4913_JaffaCakes118.exe windows:5 windows x86 arch:x86
b984e8a09c4cd74af5d4187a8f898173
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SendMessageW
DispatchMessageW
GetClipboardData
GetMessageW
ToUnicode
GetKeyState
GetClassNameW
GetCursorPos
OpenWindowStationA
PeekMessageA
GetWindowLongW
CloseDesktop
CharLowerBuffA
GetForegroundWindow
LoadCursorW
FindWindowExW
GetWindowThreadProcessId
ExitWindowsEx
GetIconInfo
GetKeyboardState
GetDlgItem
CloseWindowStation
SetThreadDesktop
GetDlgItemTextA
PeekMessageW
DrawIcon
EndDialog
MsgWaitForMultipleObjects
SetProcessWindowStation
GetMessageA
GetDlgItemTextW
GetWindowTextW
OpenDesktopA
kernel32
Sleep
GetModuleHandleA
CopyFileW
lstrcatW
GetModuleFileNameW
GetCurrentThreadId
ReadFile
SetLastError
UnmapViewOfFile
SetThreadPriority
WaitForSingleObject
SetFilePointer
GetFileSizeEx
GetFileSize
ReleaseMutex
GetProcessHeap
OpenProcess
GetLogicalDrives
FindClose
GetVersionExW
SetFileTime
MoveFileExW
GetTimeZoneInformation
WriteFile
GetSystemTimeAsFileTime
DeleteFileW
lstrcpyW
lstrcatA
GetThreadPriority
WideCharToMultiByte
InitializeCriticalSection
HeapReAlloc
CreateFileMappingW
GetTickCount
SystemTimeToFileTime
GetCommandLineA
MultiByteToWideChar
GetProcessTimes
lstrlenW
GetCurrentProcessId
ResetEvent
CloseHandle
GetSystemTime
WriteProcessMemory
GetLocalTime
SetEndOfFile
GetDriveTypeW
lstrcmpiW
MapViewOfFile
FindFirstFileW
CreateFileW
SetFileAttributesW
IsBadReadPtr
lstrcpynW
FindResourceW
GetTempFileNameW
DisconnectNamedPipe
Sections
.ulwvcz Size: 39KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dyn Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adkh Size: 7KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ