Static task
static1
Behavioral task
behavioral1
Sample
14053955aa6d369cf8bc4d13d3bc28aa_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
14053955aa6d369cf8bc4d13d3bc28aa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
14053955aa6d369cf8bc4d13d3bc28aa_JaffaCakes118
-
Size
123KB
-
MD5
14053955aa6d369cf8bc4d13d3bc28aa
-
SHA1
c6f44526c593441ae63318198a19d854882950fa
-
SHA256
edfdca6799b91e546771b0a122da85bb77591295d815d7431c642a3223a42d7a
-
SHA512
fce523ec27e7bf8f972ecd25c1ea4bef147406cb821e6701d53696945b96744e1bc203587f1daa8d68df85298f5d4bcc7dba6e3c2617307f582a6a513b3420b0
-
SSDEEP
1536:cH7SCVoGc4+ib1ug+3xR0MWoRdjTylTQ5t+sNJ1+5QFtYzNPRd1eTHnEwyKqqG:cuJc1sgGDTKT8tlFjaZd1eTHEwyKqq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14053955aa6d369cf8bc4d13d3bc28aa_JaffaCakes118
Files
-
14053955aa6d369cf8bc4d13d3bc28aa_JaffaCakes118.exe windows:4 windows x86 arch:x86
d92b7129ea815c4a02f562acf937dfde
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DrawMenuBar
MessageBoxA
DrawIcon
ShowScrollBar
EnableScrollBar
DrawEdge
GetMenuState
GetDesktopWindow
GetClassInfoA
GetDCEx
DrawIconEx
GetWindow
IsChild
SetWindowTextA
GetPropA
BeginPaint
CharToOemA
CreateWindowExA
EnableWindow
GetMenuItemCount
EnumWindows
EndDeferWindowPos
IsWindowVisible
CheckMenuItem
GetSysColor
GetMenu
IsDialogMessageA
GetMessagePos
GetScrollInfo
EnableMenuItem
GetMenuItemInfoA
SetCursor
FrameRect
GetMenuItemID
DeferWindowPos
CallWindowProcA
DefWindowProcA
DefFrameProcA
DispatchMessageA
GetCapture
GetFocus
GetMenuStringA
DrawTextA
GetClassLongA
EnumChildWindows
CreateMenu
GetKeyNameTextA
CharLowerBuffA
CreatePopupMenu
GetLastActivePopup
GetIconInfo
FindWindowA
TrackPopupMenu
GetScrollPos
GetActiveWindow
EqualRect
GetKeyState
SetWindowLongA
CharNextA
GetParent
GetScrollRange
DefMDIChildProcA
GetCursorPos
GetWindowTextA
GetSysColorBrush
GetClipboardData
GetCursor
msvcrt
malloc
memmove
log10
tan
_acmdln
comctl32
ImageList_Write
ImageList_Destroy
ImageList_DrawEx
ImageList_Create
ImageList_Add
ImageList_Draw
ImageList_GetBkColor
ImageList_Remove
kernel32
GetCurrentThreadId
GetStdHandle
ExitThread
DeleteFileA
SizeofResource
FreeResource
GetVersionExA
GetStartupInfoA
SetHandleCount
LoadLibraryExA
GetFullPathNameA
WaitForSingleObject
ExitProcess
GetCPInfo
SetLastError
GetProcessHeap
lstrcatA
lstrlenA
MoveFileA
SetErrorMode
CreateFileA
GetFileType
GetDateFormatA
InitializeCriticalSection
GetACP
LoadResource
FindFirstFileA
GetThreadLocale
FreeLibrary
lstrcpynA
VirtualFree
WideCharToMultiByte
LocalReAlloc
HeapFree
LockResource
VirtualAllocEx
CreateEventA
FindResourceA
GetLocalTime
GetFileAttributesA
Sleep
lstrcpyA
RaiseException
MoveFileExA
GetLastError
LocalFree
GetProcAddress
FormatMessageA
GetTickCount
GetDiskFreeSpaceA
GetOEMCP
ReadFile
VirtualAlloc
CloseHandle
EnumCalendarInfoA
GetCurrentThread
lstrcmpA
GlobalAlloc
GetCommandLineA
GetCurrentProcess
GetSystemDefaultLangID
CreateThread
GetModuleFileNameA
GlobalAddAtomA
HeapAlloc
GetCurrentProcessId
EnterCriticalSection
GlobalFindAtomA
GetModuleHandleA
Sections
.text Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ