Static task
static1
Behavioral task
behavioral1
Sample
52f837ff6adcce03fa690528974b6dd7_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
52f837ff6adcce03fa690528974b6dd7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
52f837ff6adcce03fa690528974b6dd7_JaffaCakes118
-
Size
69KB
-
MD5
52f837ff6adcce03fa690528974b6dd7
-
SHA1
7ed780ba02533798b87c8cc9d322d95f6c33a9b7
-
SHA256
630869ce8a99a63ca3f8eab57366087e293fee922f54537c93f13fa17e7e3d27
-
SHA512
b85ca0f8ebff1363ea39973a4cb22c08d0b53208964df07357791c6601dca05a4c32e0d8e1c7b8f7f0a085660d98380f0ffccdc7458e2cb3c06a5bc3471d4494
-
SSDEEP
768:y9+RT86vRnyKidsMsf1sQlwBZNlZiE3MwWgwWjdazKgbdQPNhCqDz2LzBPC:yfNKAs9f6Q889g9gNdQFhCqDzgzBa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 52f837ff6adcce03fa690528974b6dd7_JaffaCakes118
Files
-
52f837ff6adcce03fa690528974b6dd7_JaffaCakes118.exe windows:4 windows x86 arch:x86
3333816f78a363225600f816a922bdce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
sprintf
strcmp
strncmp
memcpy
fclose
strncpy
_strnicmp
strlen
strcpy
strcat
memmove
memcmp
_stricmp
atoi
fabs
ceil
malloc
floor
free
localtime
mktime
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
HeapFree
HeapAlloc
GetCurrentProcessId
OpenProcess
SetProcessWorkingSetSize
CloseHandle
GetVersionExA
SetLastError
InitializeCriticalSection
TlsAlloc
GlobalAlloc
GlobalFree
GetCurrentThreadId
GetCurrentProcess
DuplicateHandle
CreatePipe
GetStdHandle
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameA
CreateFileA
SetFilePointer
SetEndOfFile
WriteFile
GetFileSize
ReadFile
LoadLibraryA
GetProcAddress
FreeLibrary
SetCurrentDirectoryA
DeleteFileA
HeapReAlloc
GetLocalTime
comctl32
InitCommonControls
InitCommonControlsEx
user32
GetWindow
SetActiveWindow
RemovePropA
SendMessageA
DestroyWindow
UnregisterClassA
DestroyAcceleratorTable
LoadIconA
LoadCursorA
RegisterClassA
AdjustWindowRectEx
GetSystemMetrics
GetActiveWindow
GetWindowRect
CreateWindowExA
SetPropA
ShowWindow
CreateAcceleratorTableA
PeekMessageA
MsgWaitForMultipleObjects
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
SetCursorPos
LoadImageA
SetCursor
GetWindowLongA
GetParent
MapWindowPoints
MoveWindow
SystemParametersInfoA
GetKeyState
SetCapture
PostMessageA
GetCursorPos
ReleaseCapture
GetPropA
GetClientRect
FillRect
EnumChildWindows
DefFrameProcA
DefWindowProcA
IsWindowEnabled
IsWindowVisible
SetFocus
GetFocus
IsChild
GetClassNameA
CallWindowProcA
SetWindowLongA
DestroyIcon
GetIconInfo
CreateIconFromResourceEx
CreateIconFromResource
CreateIconIndirect
MessageBoxA
GetWindowThreadProcessId
GetForegroundWindow
EnableWindow
EnumWindows
SetMenu
DestroyMenu
CreatePopupMenu
AppendMenuA
CreateMenu
SetForegroundWindow
TrackPopupMenu
gdi32
DeleteObject
GetStockObject
GetObjectType
CreateCompatibleDC
SetDIBits
DeleteDC
GetObjectA
CreateDCA
CreateDIBSection
GetDIBits
SelectObject
BitBlt
CreateBitmap
SetPixel
ole32
RevokeDragDrop
CoInitialize
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
Shell_NotifyIconA
ShellExecuteExA
Sections
.code Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 416B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ