Static task
static1
Behavioral task
behavioral1
Sample
11ce83c292a9afdb11452d38371895ea_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11ce83c292a9afdb11452d38371895ea_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
11ce83c292a9afdb11452d38371895ea_JaffaCakes118
-
Size
423KB
-
MD5
11ce83c292a9afdb11452d38371895ea
-
SHA1
c46579b3e22dacba532cbf4ae273cb4a4e8b0f4f
-
SHA256
879bc40fbda345cfedc80e1b435d652bf21d922f586fb83d218a5fcb967db1a1
-
SHA512
97a48e0f4bcbd01563517c47d166ec39bb4801589bf60abe18fae2efecddfd442883b5fa2ce737ab2ca8accc1c46c66efb7e96d81400cc51d36c20ea7a156fae
-
SSDEEP
6144:HrJJoWYds8S7UYM2HE1O5rhei/hpyHUevo1arE5TkI00jxP1a7skdXuNr:DHO3gh1G/voUrE5fHEU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 11ce83c292a9afdb11452d38371895ea_JaffaCakes118
Files
-
11ce83c292a9afdb11452d38371895ea_JaffaCakes118.exe windows:4 windows x86 arch:x86
a2d27ecebbd59903584fd140515b5880
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
CreateFileW
VirtualAlloc
VirtualFree
lstrcmpiW
lstrlenW
FormatMessageW
lstrcatW
GetCurrentProcess
SetPriorityClass
GetCommandLineW
GetStartupInfoW
GetModuleHandleW
ExitProcess
GetLocaleInfoW
InitializeCriticalSection
CreateMutexW
LoadLibraryW
GetProcAddress
CreateThread
ReleaseMutex
FreeLibrary
SetProcessShutdownParameters
EnterCriticalSection
LeaveCriticalSection
WaitForSingleObject
CloseHandle
GetCurrentDirectoryW
GetLastError
GetCurrentThreadId
lstrcpynW
LocalFree
LocalAlloc
lstrcpyW
GetProcessHeap
MultiByteToWideChar
GetThreadTimes
OpenProcess
GetPriorityClass
GetCurrentProcessId
SetProcessAffinityMask
GetProcessAffinityMask
TerminateProcess
CreateProcessW
VerifyVersionInfoW
HeapFree
HeapReAlloc
HeapAlloc
SetEvent
CreateEventW
lstrcmpW
DeleteCriticalSection
LoadLibraryA
GetVersionExA
GetNumberFormatW
user32
TranslateAcceleratorW
GetMessageW
CreateDialogParamW
MessageBoxW
PostQuitMessage
PostThreadMessageW
GetWindowThreadProcessId
FindWindowW
RegisterWindowMessageW
CheckDlgButton
TranslateMessage
IsDialogMessageW
IsDlgButtonChecked
DestroyMenu
RemoveMenu
LoadMenuW
CallWindowProcW
InvalidateRect
UpdateWindow
GetClientRect
DialogBoxParamW
CharLowerBuffW
GetGuiResources
EndDialog
DispatchMessageW
GetSubMenu
SetMenuDefaultItem
EnumWindowStationsW
GetClassLongW
IsHungAppWindow
EnumDesktopsW
CloseWindowStation
SetProcessWindowStation
GetProcessWindowStation
OpenWindowStationW
EnumWindows
CloseDesktop
SetThreadDesktop
OpenDesktopW
InternalGetWindowText
IsWindowVisible
GetWindow
EndTask
ShowWindowAsync
CascadeWindows
TileWindows
SwitchToThisWindow
GetLastActivePopup
PostMessageW
GetCursorPos
LoadAcceleratorsW
IsZoomed
EnableWindow
TrackPopupMenuEx
SendMessageTimeoutW
AllowSetForegroundWindow
SetFocus
GetWindowLongA
gdi32
CreateSolidBrush
SelectObject
BitBlt
CreatePen
GetStockObject
FillRgn
SetRectRgn
CombineRgn
CreateCompatibleDC
CreateCompatibleBitmap
Rectangle
MoveToEx
DeleteDC
LineTo
DeleteObject
GetDeviceCaps
CreateRectRgn
advapi32
RegOpenKeyExW
shell32
Shell_NotifyIconW
ShellAboutW
comctl32
ImageList_SetIconSize
ImageList_ReplaceIcon
ImageList_Create
CreateStatusWindowW
ImageList_Remove
Sections
.text Size: 391KB - Virtual size: 391KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data6 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data5 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data4 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 708B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ