Static task
static1
Behavioral task
behavioral1
Sample
39eb087d524ae5b791b13724e2bd0b59_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39eb087d524ae5b791b13724e2bd0b59_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
39eb087d524ae5b791b13724e2bd0b59_JaffaCakes118
-
Size
299KB
-
MD5
39eb087d524ae5b791b13724e2bd0b59
-
SHA1
34d40480bf8d52aa27ba86d6ae229064503faee0
-
SHA256
1ecba73c3ece34cfaee081967a5690918e8167670cd4da535b6c20d82c609380
-
SHA512
6b0870042779fed6c2b9b130fa138999754e8ce0b77716d6a86433bbe24811f91d50f4fb28be28af765fc3ed91e2a0834ac4d20b42ad43033b8221256af4fa7e
-
SSDEEP
6144:55j1MARrPhhJgczarlH7IPf/FeHNq8Qh89hlB/1m:51Bp/D+lH7IPf0H793m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39eb087d524ae5b791b13724e2bd0b59_JaffaCakes118
Files
-
39eb087d524ae5b791b13724e2bd0b59_JaffaCakes118.exe windows:4 windows x86 arch:x86
e4cc8a2ccadc7120fb7a5ed52a481778
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetCurrentThreadId
Sleep
CreateFileA
HeapDestroy
LoadLibraryExA
GetProcAddress
FindFirstFileA
LocalReAlloc
GetFileAttributesA
lstrlenA
ResetEvent
GetStringTypeW
lstrcmpA
SetFilePointer
DeleteCriticalSection
LocalFree
GetSystemDefaultLangID
FormatMessageA
GetThreadLocale
GetStdHandle
FindResourceA
SetThreadLocale
SizeofResource
MoveFileA
GetStartupInfoA
GetCommandLineA
ExitProcess
SetEvent
GetOEMCP
VirtualQuery
GetModuleHandleW
WriteFile
WaitForSingleObject
LocalAlloc
GetFileType
GetTickCount
SetLastError
GlobalDeleteAtom
EnterCriticalSection
HeapAlloc
LoadResource
GetLastError
GetStringTypeA
GetEnvironmentStrings
lstrcpyA
EnumCalendarInfoA
VirtualAllocEx
GetLocaleInfoA
GetModuleHandleA
GetVersionExA
GetCurrentProcess
VirtualAlloc
ExitThread
LoadLibraryA
RaiseException
user32
CreateWindowExA
MessageBeep
ChildWindowFromPoint
DrawEdge
AdjustWindowRectEx
GetWindowLongA
IsRectEmpty
GetSystemMetrics
DrawFrameControl
BeginPaint
GetWindowRect
UnhookWindowsHookEx
IsIconic
RegisterClassA
ReleaseDC
CallNextHookEx
LoadIconA
SetWindowPlacement
LoadStringA
GetClassLongA
InvalidateRect
EnableScrollBar
EmptyClipboard
SetPropA
GetClassInfoA
FrameRect
SetWindowTextA
DrawIconEx
DestroyWindow
RemovePropA
GetKeyboardState
TrackPopupMenu
CloseClipboard
SetActiveWindow
ScreenToClient
LoadCursorA
GetLastActivePopup
FindWindowA
IsWindowEnabled
SendMessageW
GetSystemMenu
InsertMenuA
KillTimer
SetCapture
MessageBoxA
DrawAnimatedRects
CallWindowProcA
RedrawWindow
PostMessageA
ShowScrollBar
SetRect
WaitMessage
PtInRect
CharUpperBuffA
RemoveMenu
SetScrollRange
GetKeyboardLayout
LoadKeyboardLayoutA
GetMenu
SetMenu
SetForegroundWindow
ShowOwnedPopups
MapVirtualKeyA
DispatchMessageA
SetClassLongA
PeekMessageW
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 243KB - Virtual size: 242KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hdata Size: 1024B - Virtual size: 900B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ