Static task
static1
Behavioral task
behavioral1
Sample
14a41714c7679172f2c89c0e547849ac_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
14a41714c7679172f2c89c0e547849ac_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
14a41714c7679172f2c89c0e547849ac_JaffaCakes118
-
Size
117KB
-
MD5
14a41714c7679172f2c89c0e547849ac
-
SHA1
16372f691d31a82ab09c2ae77ce2829830a455c0
-
SHA256
09b9c9fb08d3873f218409988dcf3dd5c70361193400616d4fcfac1d7a75804a
-
SHA512
7a324d230e5965c80f469bc7de2b59fcead88df01263aa7be1c95361d52d9f5d55e509d113350f595800207ebf4099ce9b8fbd6516e8179bc68e11671280a3a7
-
SSDEEP
1536:yKxK0xVVGWFM+CNdflyCBBORz0jfuKyJCIGSH35NOQIh6VQtno:vxK0hGXNVZBQRz0HVSH3mhZtn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14a41714c7679172f2c89c0e547849ac_JaffaCakes118
Files
-
14a41714c7679172f2c89c0e547849ac_JaffaCakes118.exe windows:4 windows x86 arch:x86
4134667653b692ec00e013d117605acf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DrawIconEx
GetMenuState
SetWindowTextA
FillRect
CreateMenu
GetPropA
EndDeferWindowPos
EnumChildWindows
GetIconInfo
GetCursor
GetDlgItem
DrawMenuBar
IsWindowEnabled
BeginPaint
GetSysColorBrush
SetCursor
EnableMenuItem
CharNextA
GetScrollInfo
MessageBoxA
GetMenuItemID
GetMenuItemCount
FindWindowA
EnableWindow
GetDC
IsChild
CheckMenuItem
GetFocus
BeginDeferWindowPos
ClientToScreen
GetParent
DrawEdge
DrawTextA
IsDialogMessageA
EnumThreadWindows
CallWindowProcA
GetCursorPos
CreateIcon
HideCaret
IsMenu
SetWindowLongA
GetWindow
SetWindowPos
RegisterClassA
DefWindowProcA
ShowWindow
CallNextHookEx
FrameRect
CharToOemA
GetMessagePos
GetSubMenu
GetClientRect
GetDCEx
GetClipboardData
GetClassLongA
GetClassInfoA
DeferWindowPos
DefMDIChildProcA
GetKeyState
SystemParametersInfoA
DefFrameProcA
EnableScrollBar
GetMenuItemInfoA
SetTimer
GetWindowTextA
msvcrt
log10
memmove
kernel32
GetCPInfo
ReadFile
MoveFileA
GetProcessHeap
LocalFree
VirtualQuery
GetLocaleInfoA
GetLocalTime
LockResource
DeleteCriticalSection
MoveFileExA
LoadLibraryA
GetSystemDefaultLangID
GetVersion
EnterCriticalSection
FreeResource
GetVersionExA
lstrcpynA
FindResourceA
WaitForSingleObject
VirtualAllocEx
VirtualAlloc
GetCurrentProcessId
FindFirstFileA
Sleep
HeapAlloc
ExitProcess
lstrcmpA
LocalReAlloc
FormatMessageA
GetFullPathNameA
GetModuleFileNameA
SetHandleCount
GetLastError
GetStringTypeW
CreateThread
lstrcatA
CloseHandle
GetDateFormatA
GetStdHandle
GetDiskFreeSpaceA
GetFileType
GetProcAddress
lstrlenA
HeapDestroy
CompareStringA
GlobalFindAtomA
InitializeCriticalSection
GetCurrentThreadId
RaiseException
GetModuleHandleA
FreeLibrary
GlobalAlloc
LocalAlloc
SetEndOfFile
GetThreadLocale
FindClose
SetErrorMode
DeleteFileA
CreateEventA
SetFilePointer
GetEnvironmentStrings
CreateFileA
LoadLibraryExA
shlwapi
SHDeleteKeyA
SHDeleteValueA
SHGetValueA
SHQueryInfoKeyA
Sections
.text Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.init Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE