Static task
static1
Behavioral task
behavioral1
Sample
4225f84565a0f6a71323f19895fc01f7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4225f84565a0f6a71323f19895fc01f7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4225f84565a0f6a71323f19895fc01f7_JaffaCakes118
-
Size
111KB
-
MD5
4225f84565a0f6a71323f19895fc01f7
-
SHA1
7f12c428303aaebb2f5233e36e3d50d5d924a9e6
-
SHA256
e4f42d86e46e8d55abbcfae261fbca99ea3535b24f748387e4412d22474005f6
-
SHA512
a6d8bd6a112f51ea4410ed6898d7eb031f74ce79f355205d3617d81b780ceeadf1099b679b2a8ddd433cff029cd30bbd71c5fbc5aa448fc27224a34c55e54b0c
-
SSDEEP
1536:OVejHMLv3OeRp/UvZupD6dqBQ5Xf50c1gST6ypX2BGZqW+kp462:OVejHMT31RCaDOLhiWX2BSqW+j6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4225f84565a0f6a71323f19895fc01f7_JaffaCakes118
Files
-
4225f84565a0f6a71323f19895fc01f7_JaffaCakes118.exe windows:4 windows x86 arch:x86
bdd268077206dfc747de7f67a81bb943
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDIBits
GetClipBox
SaveDC
CopyEnhMetaFileA
user32
SetClassLongA
DrawAnimatedRects
GetClassLongA
GetLastActivePopup
UnregisterClassA
CharNextW
UpdateWindow
MsgWaitForMultipleObjects
GetKeyboardLayout
GetDesktopWindow
GetMessagePos
FindWindowA
GetDC
SetWindowsHookExA
SetRect
GetFocus
ShowWindow
IntersectRect
RemovePropA
IsDialogMessageW
GetWindowDC
DispatchMessageW
MoveWindow
GetKeyboardLayoutNameA
RegisterWindowMessageA
IsWindowVisible
SetWindowTextA
ShowScrollBar
LoadKeyboardLayoutA
DestroyIcon
CloseClipboard
ClientToScreen
OpenClipboard
EnumChildWindows
IsDialogMessageA
SetActiveWindow
GetMenuItemID
ChildWindowFromPoint
GetWindowRect
SetTimer
DefMDIChildProcA
DrawMenuBar
SetParent
IsWindowEnabled
GetWindowThreadProcessId
InvalidateRect
IsZoomed
MapVirtualKeyA
SetWindowPos
GetKeyboardType
GetKeyState
wsprintfA
SetScrollInfo
GetCursor
GetClipboardData
GetMenuStringA
MessageBeep
RegisterClassA
GetCursorPos
GetIconInfo
MapWindowPoints
GetClassInfoA
DestroyMenu
PeekMessageA
SetMenu
CharLowerBuffA
DestroyWindow
SetWindowLongW
ActivateKeyboardLayout
CallNextHookEx
SetScrollPos
GetSystemMetrics
EqualRect
EmptyClipboard
RedrawWindow
DrawTextA
GetClassNameA
GetActiveWindow
UnhookWindowsHookEx
OffsetRect
ReleaseCapture
EnableWindow
RegisterClipboardFormatA
GetForegroundWindow
KillTimer
GetWindow
AdjustWindowRectEx
GetWindowLongA
SetMenuItemInfoA
LoadStringA
ReleaseDC
LoadCursorA
GetMenu
GetWindowLongW
GetKeyboardState
CreatePopupMenu
shell32
DragQueryFileA
Shell_NotifyIconA
SHGetDesktopFolder
oleaut32
VariantChangeType
SysAllocStringLen
SysStringLen
kernel32
lstrlenA
ExitThread
GetLastError
lstrcatA
SetEvent
GetModuleHandleA
VirtualAlloc
SetLastError
GetVersionExA
VirtualAllocEx
Sleep
GlobalFindAtomA
CreateEventA
ExitProcess
LocalAlloc
GetProcAddress
GetSystemDefaultLangID
version
VerInstallFileA
VerFindFileA
VerQueryValueA
shlwapi
SHEnumValueA
PathFileExistsA
SHSetValueA
SHDeleteKeyA
SHQueryInfoKeyA
PathGetCharTypeA
PathIsContentTypeA
comctl32
ImageList_Create
Sections
CODE Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 520B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ