Static task
static1
Behavioral task
behavioral1
Sample
00d3be4ea407ca8dc0210d8a68291d1c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
00d3be4ea407ca8dc0210d8a68291d1c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
00d3be4ea407ca8dc0210d8a68291d1c_JaffaCakes118
-
Size
171KB
-
MD5
00d3be4ea407ca8dc0210d8a68291d1c
-
SHA1
0b63638587871f2343ee1826c014f53ddda84896
-
SHA256
de40bce91b7f2f42f81e477ba09c3bb0ec4d187a613a79ff2fa394a3e7905b24
-
SHA512
359721c6a29e9ab3c23cf79fef7405b2f69be28f9e7cc6163fa314324987ec02d05ea0fd6165bff9865e3ca1ec4ef380284c8dc4979a95d79bc27e37ff2d5a42
-
SSDEEP
3072:j3tWUS7dZUhdqF4IqL45EizBn5k+bZ0SXWFLyD7N6ChkLH1iEeQcXvbxyeuZ9:jIUS8hzIqkOyBnK+6SyK6iEerXTxp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00d3be4ea407ca8dc0210d8a68291d1c_JaffaCakes118
Files
-
00d3be4ea407ca8dc0210d8a68291d1c_JaffaCakes118.exe windows:4 windows x86 arch:x86
41e6c6d94fe015e2ae753816aed7ea0b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoA
user32
GetKeyboardType
GetSystemMenu
InsertMenuItemA
DispatchMessageW
SetActiveWindow
EnumChildWindows
UnregisterClassA
DrawFrameControl
CharUpperBuffA
DefFrameProcA
DrawEdge
GetMenu
DrawMenuBar
SetWindowsHookExA
GetKeyboardLayoutList
SetWindowTextA
GetTopWindow
GetMenuItemInfoA
GetDesktopWindow
IsIconic
EnumWindows
DrawTextA
GetActiveWindow
ReleaseDC
GetFocus
TrackPopupMenu
SendMessageA
SetScrollPos
GetScrollRange
DestroyMenu
PeekMessageA
SetParent
GetWindowLongW
DrawIcon
GetSysColor
LoadIconA
FillRect
SetForegroundWindow
IsChild
GetMenuItemCount
GetCursorPos
TranslateMDISysAccel
IsDialogMessageA
GetPropA
CharLowerA
OemToCharA
IsWindowVisible
GetSysColorBrush
PeekMessageW
DispatchMessageA
SetWindowPlacement
DefMDIChildProcA
GetClassInfoA
GetClassLongA
CharLowerBuffA
WindowFromPoint
SetClipboardData
GetSystemMetrics
OffsetRect
IsWindowUnicode
GetCapture
CharNextA
EndPaint
GetForegroundWindow
ClientToScreen
GetClientRect
CharNextW
MapWindowPoints
DestroyCursor
IsDialogMessageW
GetWindowThreadProcessId
EmptyClipboard
GetWindowLongA
GetKeyNameTextA
SetClassLongA
ScrollWindow
CallNextHookEx
CreatePopupMenu
GetKeyboardState
IsRectEmpty
CharToOemA
LoadKeyboardLayoutA
CheckMenuItem
RegisterClassA
ReleaseCapture
GetLastActivePopup
GetSubMenu
RegisterClipboardFormatA
SetMenu
ActivateKeyboardLayout
UpdateWindow
SetScrollRange
TranslateMessage
RedrawWindow
GetKeyboardLayoutNameA
GetClassNameA
MessageBoxA
EqualRect
PostMessageA
OpenClipboard
AdjustWindowRectEx
GetMessagePos
MsgWaitForMultipleObjects
PtInRect
SetFocus
GetWindowRect
EnableScrollBar
GetCursor
MessageBeep
ShowScrollBar
DestroyWindow
SendMessageW
SetCapture
GetMenuItemID
gdi32
SetBkColor
CreateCompatibleBitmap
CreateBitmap
GetObjectA
CreateBrushIndirect
SetTextColor
kernel32
GetProcAddress
GetCPInfo
lstrlenA
CloseHandle
ExitProcess
GetStdHandle
GetFileSize
VirtualAllocEx
GetUserDefaultLCID
lstrcmpiA
GetCommandLineA
GetACP
GetEnvironmentStrings
GetDateFormatA
GetModuleHandleA
SetHandleCount
LoadLibraryA
CreateThread
GetOEMCP
shell32
Shell_NotifyIconA
SHGetSpecialFolderLocation
SHGetDiskFreeSpaceA
SHFileOperationA
DragQueryFileA
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 140KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE