Static task
static1
Behavioral task
behavioral1
Sample
167e78b1bf29a9b5bd6e330beda7e214_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
167e78b1bf29a9b5bd6e330beda7e214_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
167e78b1bf29a9b5bd6e330beda7e214_JaffaCakes118
-
Size
183KB
-
MD5
167e78b1bf29a9b5bd6e330beda7e214
-
SHA1
e50944d14f69ca61a7d171acbfabef74021cd482
-
SHA256
6c284927a39d735a2454e87eaa9ed422c1eab36c2e1e703fcd0c22156449c19d
-
SHA512
424703deed935318e468e343cfff49f8a138ef02b0de0178140112371b523d18b2101ecb7ef826e4b73e95c96ba57cf44f226dd4dd4ef43277d743d2d9097fdb
-
SSDEEP
3072:axdC1qMD076AGoht9CaVySS7qGsTQJ8OXVZo5oJolMf53xEEJIsokfh6g6mA/F:shgi6AzhtVNSOyJFZBJaMfp1JIsN9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 167e78b1bf29a9b5bd6e330beda7e214_JaffaCakes118
Files
-
167e78b1bf29a9b5bd6e330beda7e214_JaffaCakes118.exe windows:4 windows x86 arch:x86
ea09ea98b079455a84205294de44e35d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
ole32
ProgIDFromCLSID
CoTaskMemFree
StringFromCLSID
gdi32
CreateRectRgn
SelectObject
SetBkMode
CreateFontIndirectA
BitBlt
DeleteMetaFile
TextOutA
GetObjectA
SaveDC
DeleteDC
DeleteObject
EnumFontFamiliesExA
CreateCompatibleDC
SetTextColor
GetTextExtentPoint32A
GetDeviceCaps
Rectangle
GetStockObject
RestoreDC
CreateSolidBrush
CreateCompatibleBitmap
advapi32
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegSetValueExA
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
winmm
mciSendCommandA
sndPlaySoundA
oleacc
LresultFromObject
CreateStdAccessibleObject
user32
SetWindowLongA
SetCursor
ReleaseDC
GetDC
ReleaseCapture
GetWindowInfo
IsWindow
GetSysColor
GetDlgItem
FillRect
LoadCursorA
GetWindowLongA
MoveWindow
SetWindowPos
SetCapture
kernel32
SetTapeParameters
GetVersion
ClearCommError
FindClose
GetCurrentProcessId
Sleep
GetWindowsDirectoryA
EnumResourceNamesA
ExitProcess
InterlockedExchange
GetLocalTime
FindFirstFileA
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
Sections
.text Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lib Size: 512B - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ