Static task
static1
Behavioral task
behavioral1
Sample
138d947e83bc803788d6681273edf92c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
138d947e83bc803788d6681273edf92c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
138d947e83bc803788d6681273edf92c_JaffaCakes118
-
Size
177KB
-
MD5
138d947e83bc803788d6681273edf92c
-
SHA1
853ed9980488fe468fe438b2752e4bea85a274b4
-
SHA256
dd9dd3883c16f6d16194638d2db97d82f155ea82e62aad0078dc92e70c369e7e
-
SHA512
8279fa3038937752cf397bae1d7d79744c76756b3075beb24f8379c3216cf2d53297bd80f3a435eb455d8381ab7d61a28890c903038539a874ff0d6ddeae7f91
-
SSDEEP
3072:n+cv/Or5w5TqRB9TkPj6Fo22orDjc/qrIRErBIxr8nIZdhqTJJaU2j:n+cv/8ZRBxS6/2orDjIper5gdhq1JaH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 138d947e83bc803788d6681273edf92c_JaffaCakes118
Files
-
138d947e83bc803788d6681273edf92c_JaffaCakes118.exe windows:4 windows x86 arch:x86
0210014bbe42d9bc2f4290a08bcd24c0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadBitmapA
MessageBoxA
SendMessageA
MessageBeep
RegisterClassA
SendMessageW
ReleaseDC
LoadIconA
ScreenToClient
LoadStringA
PeekMessageW
PostMessageA
MapVirtualKeyA
ScrollWindow
PtInRect
RemovePropA
LoadKeyboardLayoutA
RegisterWindowMessageA
RedrawWindow
RemoveMenu
PeekMessageA
OpenClipboard
OffsetRect
SetActiveWindow
OemToCharA
PostQuitMessage
RegisterClipboardFormatA
LoadCursorA
ReleaseCapture
MapWindowPoints
kernel32
WriteFile
IsBadReadPtr
GetStartupInfoA
SetThreadLocale
GetDateFormatA
FreeLibrary
Sleep
WideCharToMultiByte
LoadLibraryExA
GetLastError
GetCurrentProcessId
RaiseException
GetCurrentThreadId
VirtualAlloc
GetProcAddress
SizeofResource
GetCurrentThread
lstrlenA
GetModuleFileNameA
GetCommandLineA
LocalReAlloc
FindClose
GlobalAddAtomA
GetStdHandle
EnterCriticalSection
GetFileType
SetFilePointer
IsBadHugeReadPtr
GetFileAttributesA
GetLocaleInfoA
GetModuleHandleA
FormatMessageA
MoveFileExA
GetUserDefaultLCID
lstrcmpiA
ExitThread
GetACP
GetVersionExA
SetEvent
WaitForSingleObject
InitializeCriticalSection
MulDiv
GetVersion
ReadFile
lstrcatA
GetCommandLineW
CreateEventA
DeleteFileA
LoadLibraryA
GetCPInfo
lstrlenW
ExitProcess
GetLocalTime
CreateFileA
GetFullPathNameA
GetEnvironmentStrings
LocalAlloc
LocalFree
FindFirstFileA
SetErrorMode
ResetEvent
oleaut32
SysStringLen
SysFreeString
SafeArrayPtrOfIndex
SafeArrayCreate
shell32
SHGetFolderPathA
SHGetSpecialFolderLocation
SHFileOperationA
comdlg32
GetFileTitleA
gdi32
GetPixel
CreatePalette
LineTo
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ddata Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ