Static task
static1
Behavioral task
behavioral1
Sample
02ff7f9fccefe21b76cdf341014a9db4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02ff7f9fccefe21b76cdf341014a9db4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
02ff7f9fccefe21b76cdf341014a9db4_JaffaCakes118
-
Size
166KB
-
MD5
02ff7f9fccefe21b76cdf341014a9db4
-
SHA1
3bcaccb8acb63b3dede82fdfc73faf41d4eedfbc
-
SHA256
dcfedd39bbf230181812b4ed04b929a5d39eb5f393846aa04944ccec73114980
-
SHA512
416d0e393d4cc1c91e171e912f55b881511bc8e2ae5b68c37ae64258bc73e2ddcb4436b004b5e652117f6999ef9bef3aaf2eb4a080c4a2b60144bb9cd7e97701
-
SSDEEP
3072:WVSe9YHj+D4NBUAHbDPM8CQVKXAzRkBgVqSPn9e75TI/xJ:WQh+D4NqA7w36KXgU6n9eUx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02ff7f9fccefe21b76cdf341014a9db4_JaffaCakes118
Files
-
02ff7f9fccefe21b76cdf341014a9db4_JaffaCakes118.exe windows:4 windows x86 arch:x86
a9c460f226b9d520b598dd213cb20c66
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMenuItemCount
DrawTextA
IsChild
GetFocus
GetDlgItem
MessageBoxA
SetWindowLongA
CreateMenu
IsWindowVisible
DefFrameProcA
EnumWindows
GetDC
ShowScrollBar
GetIconInfo
GetMenuItemID
CreateWindowExA
EndPaint
GetPropA
TrackPopupMenu
GetMenuStringA
SetWindowPos
GetCursorPos
GetDesktopWindow
GetKeyNameTextA
GetSubMenu
GetMenu
FrameRect
GetActiveWindow
EnableMenuItem
CallNextHookEx
FindWindowA
FillRect
SystemParametersInfoA
DrawFrameControl
GetCapture
GetCursor
EnumChildWindows
SetTimer
DrawEdge
CharLowerBuffA
GetClipboardData
BeginPaint
GetMenuItemInfoA
CharToOemA
CharLowerA
GetWindow
CharNextA
GetMessagePos
CheckMenuItem
DrawIconEx
EnableScrollBar
CallWindowProcA
GetWindowTextA
msvcrt
memcpy
strncmp
tan
kernel32
MoveFileA
GetProcessHeap
ExitThread
GetUserDefaultLCID
FreeLibrary
GetFileSize
GetModuleHandleA
HeapFree
DeleteFileA
WaitForSingleObject
DeleteCriticalSection
HeapAlloc
EnumCalendarInfoA
SetEndOfFile
lstrcmpA
GetOEMCP
FindResourceA
ResetEvent
LockResource
MoveFileExA
GetCurrentProcess
lstrcmpiA
GetFullPathNameA
GetCurrentThread
SizeofResource
SetThreadLocale
GetVersion
GlobalFindAtomA
FormatMessageA
GetTickCount
CloseHandle
GetStartupInfoA
GetFileType
VirtualFree
FindFirstFileA
lstrcpyA
VirtualAlloc
GetCurrentThreadId
GlobalDeleteAtom
GlobalAlloc
GetCurrentProcessId
VirtualAllocEx
CreateThread
GetVersionExA
SetEvent
GetLocaleInfoA
LocalReAlloc
GetThreadLocale
GlobalAddAtomA
GetACP
LoadLibraryA
SetFilePointer
GetStdHandle
FindClose
lstrcpynA
SetHandleCount
VirtualQuery
LocalFree
CreateFileA
GetLocalTime
lstrcatA
ExitProcess
lstrlenA
LoadLibraryExA
GetFileAttributesA
GetDateFormatA
CreateEventA
LocalAlloc
RaiseException
LoadResource
GetStringTypeA
HeapDestroy
GetCPInfo
MulDiv
Sleep
GetLastError
Sections
CODE Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 2KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ