Static task
static1
Behavioral task
behavioral1
Sample
1097e6a578d092039f1b994b1f82c5ed_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1097e6a578d092039f1b994b1f82c5ed_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1097e6a578d092039f1b994b1f82c5ed_JaffaCakes118
-
Size
111KB
-
MD5
1097e6a578d092039f1b994b1f82c5ed
-
SHA1
c35a071040e1073abd8204ef296b225757116d5a
-
SHA256
0a14ddfd0836635c66686c1f940863da4558898e99c0edb9961878de9675c9d2
-
SHA512
47cebad94dfa5a1b39d9cfd5c00d4c36b7ba22703b897bb972374a708ff6e034b8c90a5b9607cd81572e66901fbaa6e3caa3c8642fba72804e5b00b916e84491
-
SSDEEP
1536:yt6yW87QvzeC24sE5iNydMOqdVFm7jiugr2977NjhEyiooyG42:OWzeiBiNmMOCVQHiL293NlE/+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1097e6a578d092039f1b994b1f82c5ed_JaffaCakes118
Files
-
1097e6a578d092039f1b994b1f82c5ed_JaffaCakes118.exe windows:4 windows x86 arch:x86
9113e521212bf09dea75e6a7652949b5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowLongA
GetKeyNameTextA
EnumChildWindows
GetMenuItemCount
EnumWindows
GetDlgItem
FillRect
TrackPopupMenu
CreateIcon
GetMessagePos
BeginPaint
SetWindowPos
ClientToScreen
GetClipboardData
GetFocus
GetMenu
DrawIcon
GetSysColor
CharLowerA
MessageBoxA
GetSysColorBrush
GetScrollInfo
DrawMenuBar
GetActiveWindow
GetWindow
EnumThreadWindows
GetMenuItemInfoA
GetIconInfo
GetMenuItemID
CreateMenu
GetMenuStringA
SetCursor
GetClassInfoA
IsWindowVisible
CreateWindowExA
GetParent
DrawFrameControl
SystemParametersInfoA
EnableMenuItem
ShowScrollBar
CheckMenuItem
EnableWindow
DeferWindowPos
GetForegroundWindow
DispatchMessageA
GetCursor
DispatchMessageW
IsDialogMessageA
GetKeyState
CharLowerBuffA
IsChild
HideCaret
CreatePopupMenu
IsMenu
GetClassLongA
SetWindowTextA
EqualRect
EndPaint
GetDCEx
GetLastActivePopup
EndDeferWindowPos
ShowWindow
FindWindowA
CharToOemA
DefFrameProcA
GetScrollPos
BeginDeferWindowPos
kernel32
FreeResource
SetEndOfFile
CloseHandle
ReadFile
LoadLibraryA
WideCharToMultiByte
GlobalDeleteAtom
Sleep
EnterCriticalSection
GetTickCount
CreateFileA
GetStringTypeW
GetEnvironmentStrings
WaitForSingleObject
GetACP
GlobalAlloc
GetDiskFreeSpaceA
GetFullPathNameA
GetProcAddress
GetStartupInfoA
GetStringTypeA
GetThreadLocale
InitializeCriticalSection
FindResourceA
VirtualAlloc
GetFileType
lstrlenA
GetFileSize
GetUserDefaultLCID
HeapAlloc
VirtualQuery
GetLastError
FormatMessageA
FindFirstFileA
GetLocalTime
ExitProcess
LockResource
lstrcatA
GetProcessHeap
GetFileAttributesA
DeleteFileA
GetCurrentProcess
CreateEventA
lstrcmpA
GetVersionExA
HeapFree
lstrcpyA
GetStdHandle
GetCurrentThreadId
GetCurrentThread
GetModuleHandleA
GetDateFormatA
MoveFileA
ExitThread
LoadLibraryExA
SetEvent
CompareStringA
MulDiv
VirtualAllocEx
SetFilePointer
DeleteCriticalSection
comctl32
ImageList_DrawEx
ImageList_Add
ImageList_Draw
ImageList_DragShowNolock
ImageList_Write
ImageList_Create
ImageList_Remove
ImageList_GetBkColor
ImageList_Read
ImageList_Destroy
msvcrt
rand
log10
strcmp
mbstowcs
memmove
wcstol
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ