Static task
static1
Behavioral task
behavioral1
Sample
54e14ee0bf4d165a531a02cc0c296fca_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54e14ee0bf4d165a531a02cc0c296fca_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
54e14ee0bf4d165a531a02cc0c296fca_JaffaCakes118
-
Size
144KB
-
MD5
54e14ee0bf4d165a531a02cc0c296fca
-
SHA1
c0a7dcbc14713febc0994446fe2198b3baf77e1d
-
SHA256
5e43c705dc1ea33dda4050639b12d83e3e064b28902233cf2cfac2fd282e39f7
-
SHA512
97c98012a17c8de5fa4697b2dc06c5f0e7df9f4c05fb22a653cb943ff042ab891701bad988f86bd8087ca67b2315be75701b20c8489b0d8b7adadb318494d6a7
-
SSDEEP
3072:5lc4BfDsLg1EjFpUIVMUJfp6OgQqtPMxOJu0eiM8uv6UCpY:XpfDss1EFpiKQOgQqtIOJheiM8E6T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 54e14ee0bf4d165a531a02cc0c296fca_JaffaCakes118
Files
-
54e14ee0bf4d165a531a02cc0c296fca_JaffaCakes118.exe windows:4 windows x86 arch:x86
627c17d21fcd53237f344b0f94826dd6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetOEMCP
lstrlenW
GetModuleHandleW
ExitProcess
GetVersionExA
GetModuleHandleA
GetCommandLineA
ExitThread
GetProcAddress
LoadLibraryA
VirtualAllocEx
GetCommandLineW
IsBadReadPtr
user32
CreateIcon
MessageBoxA
GetScrollRange
CallNextHookEx
PeekMessageA
GetKeyState
CreateMenu
IsWindow
CharLowerBuffA
CheckMenuItem
GetKeyboardLayout
GetWindowPlacement
GetMessagePos
CharToOemA
RegisterClipboardFormatA
GetSystemMenu
ReleaseDC
DrawMenuBar
DestroyWindow
CreatePopupMenu
DispatchMessageA
GetDC
GetTopWindow
GetActiveWindow
DestroyIcon
EqualRect
WindowFromPoint
RemoveMenu
ChildWindowFromPoint
IsChild
OpenClipboard
InsertMenuItemA
SetFocus
RegisterClassA
GetClassLongA
CharLowerA
SetPropA
EnumChildWindows
GetMenu
GetWindow
SetWindowsHookExA
EnumWindows
AdjustWindowRectEx
GetMenuItemInfoA
DrawIconEx
SetTimer
SetClassLongA
EnableMenuItem
CharNextW
CharNextA
ScreenToClient
LoadIconA
DeleteMenu
IntersectRect
TranslateMDISysAccel
GetMenuStringA
DrawEdge
DefFrameProcA
GetMenuItemID
SetRect
GetClassInfoA
CharUpperBuffA
SetScrollRange
GetScrollPos
PeekMessageW
SetForegroundWindow
DrawFrameControl
LoadCursorA
GetDCEx
SetWindowPos
IsIconic
LoadKeyboardLayoutA
DestroyCursor
GetWindowThreadProcessId
UpdateWindow
wsprintfA
TrackPopupMenu
EnableScrollBar
GetParent
FrameRect
ClientToScreen
OemToCharA
GetDlgItem
DestroyMenu
ActivateKeyboardLayout
BeginPaint
DrawIcon
GetClassNameA
IsDialogMessageA
DefMDIChildProcA
CallWindowProcA
DefWindowProcA
IsDialogMessageW
UnregisterClassA
SetParent
ReleaseCapture
GetDesktopWindow
GetSysColor
GetForegroundWindow
KillTimer
GetIconInfo
PtInRect
CloseClipboard
SendMessageW
SetWindowPlacement
MessageBeep
DispatchMessageW
SetCapture
EnableWindow
FillRect
MapVirtualKeyA
ShowOwnedPopups
advapi32
RegOpenKeyA
RegCreateKeyA
RegQueryValueA
version
GetFileVersionInfoA
VerInstallFileA
Sections
.text Size: 104KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ