Static task
static1
Behavioral task
behavioral1
Sample
0e5681fca2c782076ba82d3f9fd4b68e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0e5681fca2c782076ba82d3f9fd4b68e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0e5681fca2c782076ba82d3f9fd4b68e_JaffaCakes118
-
Size
148KB
-
MD5
0e5681fca2c782076ba82d3f9fd4b68e
-
SHA1
51093b6442431217a848530b72010884ff111884
-
SHA256
e596ab072ea1bc0dab41a936a4d6d6e9a50fdca1d3a2efe3018d923d19fd708a
-
SHA512
4aa8e20db37094e36ee9544b7bc9b650e359a11287a6a9c52e6d1536be4d46dd9c86831e125b8402efe680d91f7472a19faf599eff67bbcf18ef460a3695298e
-
SSDEEP
3072:FKB77AZx/m9XbNPJDexHMYPrZSZwsT1JU6YB6am9y1:Fk8x/m5dJ8HRPV76S6q6jc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e5681fca2c782076ba82d3f9fd4b68e_JaffaCakes118
Files
-
0e5681fca2c782076ba82d3f9fd4b68e_JaffaCakes118.exe windows:4 windows x86 arch:x86
1955b08cfb855a0c86a4069c6cc259ea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
VerFindFileA
VerInstallFileA
kernel32
GetModuleHandleW
GetProcAddress
GetOEMCP
ExitProcess
IsBadReadPtr
GetModuleHandleA
GetVersionExA
LoadLibraryA
GetCommandLineA
VirtualAlloc
ExitThread
LoadLibraryExA
user32
GetCapture
DeleteMenu
GetWindowDC
IsWindowEnabled
GetForegroundWindow
GetMenuItemInfoA
CallWindowProcA
IsRectEmpty
DrawIconEx
EnableWindow
GetWindowThreadProcessId
GetClassLongA
CharNextA
DrawFrameControl
CharLowerA
GetScrollPos
CharUpperBuffA
FrameRect
OpenClipboard
ShowWindow
EndPaint
DrawTextA
ActivateKeyboardLayout
ShowScrollBar
GetWindowLongW
CharNextW
SetPropA
SetWindowPos
ScreenToClient
GetTopWindow
GetSubMenu
OffsetRect
TranslateMessage
CreateMenu
SetScrollInfo
GetDCEx
GetDesktopWindow
GetMenu
BeginPaint
AdjustWindowRectEx
GetFocus
GetKeyboardType
OemToCharA
PostQuitMessage
DispatchMessageW
GetSysColor
MessageBoxA
WindowFromPoint
EnumThreadWindows
SetScrollPos
SetClassLongA
MapVirtualKeyA
TrackPopupMenu
CharLowerBuffA
GetIconInfo
GetSystemMenu
InsertMenuItemA
RemoveMenu
DefFrameProcA
PeekMessageW
LoadIconA
DefWindowProcA
SetForegroundWindow
SendMessageW
GetPropA
InsertMenuA
GetKeyNameTextA
GetParent
GetMenuItemID
MsgWaitForMultipleObjects
DrawMenuBar
InflateRect
IsDialogMessageA
EnumWindows
CreateWindowExA
DrawIcon
RemovePropA
CreateIcon
IsZoomed
CheckMenuItem
UnhookWindowsHookEx
LoadKeyboardLayoutA
CharToOemA
SetTimer
IsWindow
GetClassNameA
GetWindowLongA
PeekMessageA
GetKeyState
ReleaseCapture
EnumChildWindows
IsDialogMessageW
GetKeyboardLayoutNameA
SetClipboardData
SetRect
FillRect
GetScrollRange
DestroyIcon
EnableScrollBar
GetWindowTextA
DefMDIChildProcA
LoadBitmapA
FindWindowA
GetScrollInfo
CreatePopupMenu
LoadCursorA
GetMenuState
RegisterClipboardFormatA
DestroyWindow
PostMessageA
CallNextHookEx
GetSysColorBrush
SetCursor
MapWindowPoints
RedrawWindow
UnregisterClassA
DestroyMenu
SendMessageA
DestroyCursor
MoveWindow
GetWindowRect
SetFocus
LoadStringA
GetDC
Sections
CODE Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 734B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ddata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ