Static task
static1
Behavioral task
behavioral1
Sample
53d73a8a1ee603f105fe73d4ddbd5211_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
53d73a8a1ee603f105fe73d4ddbd5211_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
53d73a8a1ee603f105fe73d4ddbd5211_JaffaCakes118
-
Size
194KB
-
MD5
53d73a8a1ee603f105fe73d4ddbd5211
-
SHA1
3a6bfbdfa3134a2bdb368b4d06e51750e79ec9e4
-
SHA256
1a24341ccf8ff09a4e78275810be89dcc709a3478662b3ab251da72db635c22b
-
SHA512
b1e326d221a78ee14acbc214cc8a2e350af22b6b59e966af0a3acc45de9fa6d118f0d88a0ae919341944aa1ae32a9975eb778b396d084ccdc25551f96429d809
-
SSDEEP
3072:ryKy0HtY3Is6nx718+2ur/g6R+uDzgEC1nGIjlDFceZCCN:zyqy32nBnLg0vgEIGIjrZCCN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53d73a8a1ee603f105fe73d4ddbd5211_JaffaCakes118
Files
-
53d73a8a1ee603f105fe73d4ddbd5211_JaffaCakes118.exe windows:5 windows x86 arch:x86
4aba73af3b4167bf77c9550239c2db2c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowLongW
SetWindowTextA
wsprintfW
WinHelpA
DestroyMenu
InvalidateRgn
DialogBoxParamW
BeginDeferWindowPos
GetMenuBarInfo
TrackMouseEvent
AnyPopup
GetScrollPos
GetCursorPos
GetClassWord
MessageBoxW
IsCharAlphaW
GetUserObjectInformationA
GetWindowTextLengthW
IsHungAppWindow
DefFrameProcW
GetScrollRange
RealChildWindowFromPoint
GetMenuItemRect
GetDC
advapi32
RegCloseKey
GetFileSecurityW
RegSetValueExW
RegCreateKeyExA
LookupPrivilegeValueW
gdi32
SetPaletteEntries
GetKerningPairsA
CreateEllipticRgn
PolyPolyline
CloseEnhMetaFile
GetTextCharsetInfo
GetTextCharacterExtra
SetWindowOrgEx
GdiGradientFill
CreatePatternBrush
SetBrushOrgEx
CopyEnhMetaFileW
FloodFill
ScaleViewportExtEx
StartDocW
Ellipse
PolyDraw
GetBitmapBits
EnumMetaFile
RectVisible
SetTextAlign
DeleteColorSpace
SetTextJustification
SetMapMode
GetDCOrgEx
GetEnhMetaFilePixelFormat
GetMapMode
GetSystemPaletteUse
DeleteMetaFile
GetDeviceGammaRamp
BitBlt
crypt32
CertOIDToAlgId
kernel32
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
RtlUnwind
LoadLibraryA
RaiseException
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
GetLogicalDriveStringsA
GetProcessHeap
ReleaseMutex
LockResource
OpenProcess
GetProcessIoCounters
GetFileInformationByHandle
GetEnvironmentStrings
GetCurrentProcessId
CompareStringA
GetComputerNameW
GetPrivateProfileStringW
UnmapViewOfFile
GetPrivateProfileStringA
GetFileAttributesW
MulDiv
GetModuleFileNameW
GetOEMCP
FileTimeToLocalFileTime
GlobalFree
SetDllDirectoryA
QueueUserAPC
GetLogicalDriveStringsW
CompareFileTime
WideCharToMultiByte
CloseHandle
HeapAlloc
GetCommandLineA
GetStartupInfoA
GetProcAddress
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
SetUnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetCPInfo
GetACP
IsValidCodePage
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
Sections
.text Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ