Static task
static1
Behavioral task
behavioral1
Sample
ffa7c62b274cf510734f2c494f794320_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffa7c62b274cf510734f2c494f794320_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ffa7c62b274cf510734f2c494f794320_JaffaCakes118
-
Size
195KB
-
MD5
ffa7c62b274cf510734f2c494f794320
-
SHA1
f7f948ae5b89bc66c2b66bcb9c6111c1916fe185
-
SHA256
193ee7a63b7c77f40cbdac0636019aa9c512b906f38bf6ac474c196345f31bb4
-
SHA512
8aff06f32f65ddccfd8a5c8e995f64e583ffa75cd65a38d32cf7d96ba62ef1cfb66a20d2ff005b39c5ab4d158ef6981c61675b03c2314f31bb808800a9bb0047
-
SSDEEP
6144:BLvd5oihfWJ+9tLOTIhoMQEtbvlSqWdgv1d48G:BjlgJ+LLOkhoMQEtbO417G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ffa7c62b274cf510734f2c494f794320_JaffaCakes118
Files
-
ffa7c62b274cf510734f2c494f794320_JaffaCakes118.exe windows:4 windows x86 arch:x86
c97103a3165b3501320dc0af46ab4b6e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FileTimeToSystemTime
GetThreadPriority
CreateDirectoryExW
WaitForSingleObjectEx
GetExitCodeThread
GetCurrencyFormatA
IsValidLocale
CreateNamedPipeA
SetCalendarInfoA
FindFirstVolumeMountPointA
FlushViewOfFile
WriteFileEx
CreateDirectoryA
AssignProcessToJobObject
GetPrivateProfileStructW
DeleteCriticalSection
EnumDateFormatsExW
SetLocaleInfoW
GetNamedPipeHandleStateA
EndUpdateResourceA
GetShortPathNameA
EnumUILanguagesA
CreatePipe
FreeEnvironmentStringsW
SetFileAttributesW
FreeEnvironmentStringsA
WritePrivateProfileSectionA
GetCPInfo
lstrcpyW
GetCurrentThreadId
MoveFileA
GetVolumePathNameW
ExitProcess
GetDiskFreeSpaceExA
GlobalSize
SetFilePointerEx
FlushFileBuffers
GetCPInfoExW
_lwrite
GetCurrencyFormatW
DeleteFileA
InitAtomTable
user32
SendMessageA
DdeFreeStringHandle
CloseWindow
DispatchMessageW
DeferWindowPos
HideCaret
OpenInputDesktop
ScreenToClient
InsertMenuW
TileChildWindows
SetClassLongW
GetKeyNameTextW
IsCharLowerW
MapVirtualKeyExA
SetLayeredWindowAttributes
VkKeyScanW
EnableScrollBar
GetListBoxInfo
LoadCursorFromFileA
GetProcessWindowStation
IsDialogMessageA
ShowScrollBar
GetLastActivePopup
ExitWindowsEx
OpenDesktopW
GetMonitorInfoA
SetCaretPos
AllowSetForegroundWindow
OpenWindowStationW
GetMenu
GetKeyboardState
LoadMenuIndirectW
GetComboBoxInfo
FindWindowExA
FindWindowW
DrawTextExW
ReplyMessage
PostThreadMessageA
DdeAddData
GetMenuItemInfoA
MessageBoxIndirectA
AdjustWindowRect
GetIconInfo
ExcludeUpdateRgn
DefDlgProcA
SetSystemCursor
SetThreadDesktop
InvertRect
MonitorFromWindow
DdeQueryNextServer
IsWindowUnicode
SetWinEventHook
GetWindowModuleFileNameW
SetProcessDefaultLayout
CreateDesktopA
BroadcastSystemMessageW
RegisterShellHookWindow
MessageBoxW
GetTopWindow
ImpersonateDdeClientWindow
IsZoomed
UnregisterHotKey
EnumDesktopsA
GetDlgItemTextW
GetClassInfoA
SendNotifyMessageA
IsChild
ShowCursor
GetMessageA
GetPropW
BeginPaint
GetShellWindow
DialogBoxParamA
InsertMenuA
LookupIconIdFromDirectoryEx
UnregisterDeviceNotification
EnumDesktopsW
DdeInitializeA
WindowFromPoint
CascadeWindows
CheckRadioButton
DlgDirListComboBoxA
TranslateMDISysAccel
IMPQueryIMEA
EnumPropsW
CharPrevA
DdeClientTransaction
GetSystemMenu
RealChildWindowFromPoint
GetQueueStatus
DestroyAcceleratorTable
ScrollWindow
RegisterWindowMessageW
SetRect
GetWindowInfo
SwitchDesktop
shell32
SHGetNewLinkInfoA
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 59KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ