Static task
static1
Behavioral task
behavioral1
Sample
08d5d840480ef110a6f87ecde49bc3d2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08d5d840480ef110a6f87ecde49bc3d2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
08d5d840480ef110a6f87ecde49bc3d2_JaffaCakes118
-
Size
164KB
-
MD5
08d5d840480ef110a6f87ecde49bc3d2
-
SHA1
250f72bb94cbee8cb212bda0c74f3dc49293a262
-
SHA256
e70d0b3c393eab3621ca64a5833f3e62b251ea8c568a1b68375a9fed47cdf240
-
SHA512
458c14165f3c61f85ca5fd8324c7682fd442975e4c07056f766759c1d00a329aa66f8849876c2d5cb19ad01c1805131d931be507156e92fa086a0db00769b241
-
SSDEEP
3072:jYNYDPZZyNwMNLfgWmJ5xVoy0eJ9J1/y74GTPhd6xHHHZX3cy0K0:jYNYt4SJDW09J1si589v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08d5d840480ef110a6f87ecde49bc3d2_JaffaCakes118
Files
-
08d5d840480ef110a6f87ecde49bc3d2_JaffaCakes118.exe windows:4 windows x86 arch:x86
a5186c2e63539cbcc846c6db660ccbee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
SysAllocStringLen
SafeArrayGetElement
SafeArrayUnaccessData
VariantCopyInd
GetErrorInfo
SafeArrayGetUBound
VariantChangeType
SysStringLen
SysFreeString
user32
EndPaint
BeginDeferWindowPos
GetCapture
ShowWindow
EnableWindow
CharLowerBuffA
CharNextA
MessageBoxA
GetIconInfo
RegisterClassA
FillRect
DeferWindowPos
GetSysColorBrush
DrawMenuBar
GetClientRect
GetClassLongA
CreateIcon
SetWindowPos
DispatchMessageA
GetDC
GetClassInfoA
GetActiveWindow
CreatePopupMenu
GetMenuItemInfoA
SetWindowLongA
IsWindowEnabled
ClientToScreen
GetDesktopWindow
GetPropA
EnableScrollBar
SystemParametersInfoA
GetMessagePos
DefMDIChildProcA
GetCursorPos
IsDialogMessageA
GetLastActivePopup
EnumChildWindows
DispatchMessageW
SetCursor
GetScrollPos
GetKeyNameTextA
EndDeferWindowPos
DrawFrameControl
GetForegroundWindow
GetMenuState
SetTimer
TrackPopupMenu
CharLowerA
HideCaret
FrameRect
GetWindow
DrawTextA
CreateWindowExA
GetWindowTextA
CallWindowProcA
GetMenu
EqualRect
CharToOemA
ShowScrollBar
DrawEdge
EnumThreadWindows
EnableMenuItem
IsWindowVisible
IsMenu
GetCursor
SetWindowTextA
CreateMenu
GetSysColor
GetMenuStringA
GetDCEx
IsChild
DrawIcon
GetMenuItemID
GetDlgItem
DrawIconEx
GetSubMenu
GetFocus
BeginPaint
CallNextHookEx
EnumWindows
DefFrameProcA
FindWindowA
GetParent
GetClipboardData
GetKeyState
kernel32
FormatMessageA
GetProcessHeap
FreeResource
SizeofResource
GetDateFormatA
GetSystemDefaultLangID
GetFileSize
CreateThread
LocalFree
VirtualFree
LoadLibraryExA
GetLocaleInfoA
GetCurrentProcessId
LocalAlloc
HeapDestroy
ExitThread
ExitProcess
SetErrorMode
GetStringTypeW
SetEndOfFile
GetStdHandle
GetLastError
GetCurrentProcess
CreateFileA
RaiseException
GlobalAlloc
FreeLibrary
HeapFree
GetCPInfo
GetEnvironmentStrings
GetVersion
lstrcpyA
GetCurrentThreadId
GlobalAddAtomA
GetModuleHandleA
GetFileType
GetStartupInfoA
SetEvent
SetThreadLocale
FindFirstFileA
FindClose
GetCommandLineA
VirtualAllocEx
GetProcAddress
SetLastError
ReadFile
VirtualAlloc
GetOEMCP
DeleteFileA
Sleep
LocalReAlloc
msvcrt
srand
wcstol
wcscspn
memcpy
atol
calloc
clock
strlen
tolower
wcschr
time
memset
wcsncmp
rand
mbstowcs
sprintf
swprintf
exit
memmove
malloc
sqrt
Sections
CODE Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ