Static task
static1
Behavioral task
behavioral1
Sample
18485ee13b724e96c3eaa4e66f00a919_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
18485ee13b724e96c3eaa4e66f00a919_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
18485ee13b724e96c3eaa4e66f00a919_JaffaCakes118
-
Size
264KB
-
MD5
18485ee13b724e96c3eaa4e66f00a919
-
SHA1
5084a23784d44a903a5da30952b4684228f28638
-
SHA256
746f420b148eb0a65b7a1433e8a55e2f188883ac6eb38f46fe4fa991a6991237
-
SHA512
b41f80a41dfadd7a421fd5b18630c21faf4de3a067fd27e966987d663de8e686ab1028164d83a6c736c82554c8afcfbef2edac067aaff331de5c9e165967e174
-
SSDEEP
6144:XOzSS9pYrw4mdxN425rQHSPteC12RrnvdsNHBC0SlQqpbZP:XOzSw2U5reSPH12Rjvdu+ieb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 18485ee13b724e96c3eaa4e66f00a919_JaffaCakes118
Files
-
18485ee13b724e96c3eaa4e66f00a919_JaffaCakes118.exe windows:4 windows x86 arch:x86
9ac7486f947fb3746ec3b067a5351dfa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsDBCSLeadByteEx
FreeResource
FatalAppExitA
GetDriveTypeW
CloseHandle
GetBinaryTypeW
SetThreadAffinityMask
lstrcmpiW
SetThreadLocale
GlobalAddAtomW
CreateMutexW
GetVersion
WaitNamedPipeA
SwitchToFiber
FormatMessageA
lstrcatW
UnhandledExceptionFilter
CompareStringA
CancelIo
OutputDebugStringA
SizeofResource
SetHandleCount
GlobalFlags
GlobalDeleteAtom
GetModuleFileNameW
VirtualLock
GetFileAttributesExA
CreateIoCompletionPort
GetModuleHandleA
GlobalFree
WritePrivateProfileStructA
SetConsoleCursorPosition
VirtualProtect
GetVersionExA
GlobalFindAtomW
CompareStringW
GetWindowsDirectoryA
GetShortPathNameW
ExitThread
CreateProcessA
RaiseException
GetPrivateProfileSectionW
GetHandleInformation
ReadDirectoryChangesW
SetProcessAffinityMask
SetProcessShutdownParameters
GetCurrentProcess
GetProcessTimes
GetThreadContext
GetCommConfig
EndUpdateResourceA
GetProfileStringA
_lclose
SuspendThread
GetFileType
ConnectNamedPipe
GetConsoleMode
GetCommandLineA
VirtualAlloc
GetUserDefaultLangID
ExitProcess
user32
DialogBoxParamA
LoadMenuIndirectW
IsWindowEnabled
CallWindowProcW
SetDlgItemTextW
CharUpperBuffW
EnumChildWindows
MessageBoxIndirectW
SetWindowTextW
SubtractRect
ChildWindowFromPoint
OpenIcon
InsertMenuItemA
SendMessageA
SendMessageW
CreateIcon
GetMessagePos
SetWindowTextA
IsChild
BroadcastSystemMessageW
CharLowerBuffW
DestroyMenu
FindWindowA
EnumThreadWindows
LockWindowUpdate
DrawEdge
GetWindowTextLengthA
GetCaretPos
ShowWindow
GetCaretBlinkTime
ChangeMenuA
InsertMenuW
CharToOemW
SetWindowsHookExW
GetKeyboardLayoutNameW
SetParent
DefMDIChildProcW
SetWindowLongA
CopyAcceleratorTableA
GetKeyState
SetUserObjectInformationW
GrayStringW
CopyRect
IsCharUpperW
wsprintfA
SendDlgItemMessageW
PeekMessageA
IsDialogMessageW
EnumWindowStationsA
GetKeyboardLayoutNameA
CharUpperBuffA
OpenDesktopA
CopyIcon
DrawFocusRect
IsCharUpperA
ArrangeIconicWindows
SetTimer
WinHelpW
SetThreadDesktop
SetMenuItemInfoA
gdi32
GetGlyphOutlineA
SwapBuffers
InvertRgn
SaveDC
BitBlt
CreateMetaFileW
StrokePath
EnumFontsA
ResizePalette
Rectangle
SetSystemPaletteUse
GetTextCharset
ChoosePixelFormat
SetDIBitsToDevice
IntersectClipRect
CreateDIBSection
SetRectRgn
CreateDCW
GdiComment
comdlg32
ChooseFontA
CommDlgExtendedError
GetSaveFileNameA
advapi32
ClearEventLogW
shell32
SHFileOperationA
ExtractIconA
FindExecutableA
SHFileOperationW
SHGetSpecialFolderLocation
SHBrowseForFolderA
ole32
StringFromGUID2
OleBuildVersion
oleaut32
SafeArrayUnaccessData
SysFreeString
SysStringLen
LoadTypeLi
SafeArrayCreate
comctl32
_TrackMouseEvent
ImageList_Replace
CreateStatusWindowW
ImageList_Remove
shlwapi
StrStrA
PathIsUNCW
SHRegOpenUSKeyW
StrTrimW
StrCatBuffA
PathRemoveBlanksW
PathFindFileNameW
StrToIntW
PathCanonicalizeA
PathQuoteSpacesW
PathRemoveBackslashA
PathFindExtensionA
Sections
.text Size: 236KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE