Static task
static1
Behavioral task
behavioral1
Sample
0468ec32d817fb3660d301da1a06bd66_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0468ec32d817fb3660d301da1a06bd66_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0468ec32d817fb3660d301da1a06bd66_JaffaCakes118
-
Size
107KB
-
MD5
0468ec32d817fb3660d301da1a06bd66
-
SHA1
3dc117219bc7e14130d1277618f6bc2b6c9d6790
-
SHA256
fbc739e09b7ec96d24869f4886cb78872b53663f454fd494f8c2be4792237b5c
-
SHA512
5970ed91745010b27d09f0ff57bfe2f29441fc8d182afc7d40f675f1fc7ce699c49e1f33bda0d13d4954018a1c3ae332b1cadd6d69e693ea398d8900f1251e0e
-
SSDEEP
1536:7P/ctbyX/kOo6bE1m5m3zoGAOEqxj1DZqroiJf4pRClsmywCIZr3ZLy6DBj/++rd:G0g3fAOFYrJkR2JywCErxyoj2txa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0468ec32d817fb3660d301da1a06bd66_JaffaCakes118
Files
-
0468ec32d817fb3660d301da1a06bd66_JaffaCakes118.exe windows:4 windows x86 arch:x86
5e9c9efd65978125f5179e2c93566342
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
GetErrorInfo
OleLoadPicture
SysStringLen
SafeArrayGetElement
gdi32
GetBitmapBits
comdlg32
ChooseColorA
GetFileTitleA
GetSaveFileNameA
FindTextA
GetOpenFileNameA
user32
GetCursorPos
EnumThreadWindows
FindWindowA
GetClassLongA
CallNextHookEx
FrameRect
GetDesktopWindow
CreateIcon
FillRect
DeferWindowPos
GetClassInfoA
DrawFrameControl
GetDC
ClientToScreen
SetTimer
GetScrollPos
DrawIconEx
IsWindowVisible
EqualRect
SetWindowTextA
CreatePopupMenu
CharToOemA
TrackPopupMenu
CallWindowProcA
DispatchMessageA
GetMenuStringA
GetCursor
GetMenuItemInfoA
IsMenu
SystemParametersInfoA
DrawEdge
GetScrollRange
IsChild
DrawIcon
GetSysColorBrush
CharLowerBuffA
GetMenuState
GetMenuItemCount
GetCapture
GetKeyNameTextA
EndPaint
IsWindowEnabled
BeginDeferWindowPos
SetWindowPos
IsDialogMessageA
GetWindow
GetSysColor
GetFocus
GetPropA
GetActiveWindow
GetScrollInfo
EnableWindow
SetWindowLongA
EndDeferWindowPos
CharLowerA
GetSubMenu
DrawTextA
MessageBoxA
DispatchMessageW
kernel32
GetProcAddress
FreeLibrary
GetThreadLocale
GetStringTypeA
ReadFile
GetLocaleInfoA
MoveFileExA
ExitThread
GetDiskFreeSpaceA
CompareStringA
GetOEMCP
GetCurrentThreadId
GetUserDefaultLCID
CreateThread
CreateFileA
GetStartupInfoA
InitializeCriticalSection
LoadLibraryA
GlobalAlloc
WideCharToMultiByte
GetCPInfo
GetCommandLineA
LocalAlloc
GlobalDeleteAtom
GetFileSize
GetModuleHandleA
VirtualAllocEx
LocalReAlloc
GetLastError
GlobalAddAtomA
VirtualAlloc
GetCurrentThread
LocalFree
GetCurrentProcess
Sleep
lstrcmpA
FindClose
GetFileAttributesA
LoadLibraryExA
FindFirstFileA
HeapAlloc
SetEndOfFile
HeapDestroy
GetVersionExA
CreateEventA
ExitProcess
GetProcessHeap
msvcrt
memmove
malloc
clock
strcmp
wcsncmp
tolower
memcpy
wcschr
sqrt
wcscspn
exit
wcstol
memset
Sections
.text Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE