Static task
static1
Behavioral task
behavioral1
Sample
13ac8b9a70626204bc88829207807f8d_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
13ac8b9a70626204bc88829207807f8d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
13ac8b9a70626204bc88829207807f8d_JaffaCakes118
-
Size
933KB
-
MD5
13ac8b9a70626204bc88829207807f8d
-
SHA1
552eb2ef80fe14d141c9a896a8fe1af504f9655b
-
SHA256
1ef3830b653c8a5b4fe3446a94f4f155f56d8ec5b12af190800fa85293e776d6
-
SHA512
93e1db152f6d259d6a979394471aa0b9103720475c6f31c996f7168d1501c5983e8fa857cfe7e4b356dc62ec75a81ba35ead3250ab26af473e12f9f6feabb017
-
SSDEEP
24576:+VMEhyWxJIBSs9GRGC/yvDcsaWrqt3ieYD:+VMEhyMIFOw0W2tSnD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 13ac8b9a70626204bc88829207807f8d_JaffaCakes118
Files
-
13ac8b9a70626204bc88829207807f8d_JaffaCakes118.exe windows:5 windows x86 arch:x86
d9876fef2097f68b522cb9438e1f697d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetMalloc
SHGetDesktopFolder
SHBrowseForFolderA
SHGetPathFromIDListA
user32
ShowWindow
UpdateWindow
DestroyWindow
CreateWindowExA
MoveWindow
EnumChildWindows
SetWindowTextA
PeekMessageA
GetClientRect
DialogBoxParamA
CharNextA
GetDlgItem
SendMessageA
PostMessageA
KillTimer
SendDlgItemMessageA
EnableWindow
EndDialog
GetDlgItemTextA
SetDlgItemTextA
SetFocus
SetTimer
WinHelpA
MessageBoxA
LoadStringA
GetDC
ReleaseDC
CharPrevA
IsWindowEnabled
winmm
midiOutGetID
midiConnect
midiDisconnect
advapi32
RegQueryValueA
RegEnumKeyA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
kernel32
WideCharToMultiByte
MultiByteToWideChar
lstrcmpiA
IsDBCSLeadByte
lstrlenA
FindClose
FindFirstFileA
GetModuleFileNameA
LoadLibraryA
GetStdHandle
GetModuleHandleA
GetCommandLineA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
msvcrt
_controlfp
_vsnprintf
??2@YAPAXI@Z
strchr
_c_exit
_onexit
__dllonexit
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
??3@YAXPAX@Z
ole32
ReadClassStg
StgCreateDocfile
CoGetTreatAsClass
OleGetAutoConvert
StringFromCLSID
StgOpenStorage
CoCreateInstance
ProgIDFromCLSID
CoGetMalloc
gdi32
GetTextExtentPoint32A
SelectObject
Sections
.text Size: 394KB - Virtual size: 393KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 499KB - Virtual size: 499KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 36KB - Virtual size: 3.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ