Static task
static1
Behavioral task
behavioral1
Sample
b1a158112b510d4a600ea3ccceae0dc5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b1a158112b510d4a600ea3ccceae0dc5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b1a158112b510d4a600ea3ccceae0dc5_JaffaCakes118
-
Size
184KB
-
MD5
b1a158112b510d4a600ea3ccceae0dc5
-
SHA1
5095698ad284ae0054e58c8e8dabc6c4e121a48d
-
SHA256
c001fccbb274a2e8fda7f394ed5834c7841760ccd886e07046b1de545b2c36a0
-
SHA512
b0da1bd6c7715675ddc5572f1f2408b692cefb9020e519e1c07b62ff91186997c8a12ad536346a03d13b30e0126724e4cfa20e89ce2614e0528a98e1d3df6ecb
-
SSDEEP
3072:0Q2hEiTMnjCBWSilCC2K2o1FbubKmfGbxxbMZthvKxsYxxsRHD7yRJTDzkAOpQ6k:0FE8MYlq2o1BM+bPAZbKxsYxxgj7KdDz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b1a158112b510d4a600ea3ccceae0dc5_JaffaCakes118
Files
-
b1a158112b510d4a600ea3ccceae0dc5_JaffaCakes118.exe windows:4 windows x86 arch:x86
64611b8d60d35cc942c5fb15fc224a2b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DefFrameProcW
SendDlgItemMessageA
RegisterClassExW
AppendMenuW
SetClassLongA
DestroyCursor
TranslateMessage
SetClassLongW
MoveWindow
CharPrevA
SetDlgItemInt
IsDlgButtonChecked
DdeConnect
FindWindowExW
LoadImageA
DispatchMessageA
GetSysColor
SetFocus
GetMessagePos
FindWindowA
GetWindowTextLengthA
GetKeyboardState
ShowWindow
SetRect
LoadMenuA
SetScrollPos
SetForegroundWindow
EnableScrollBar
IsIconic
GetProcessWindowStation
SetWindowTextW
FillRect
DestroyAcceleratorTable
GetDlgItemTextA
CheckRadioButton
WaitMessage
ShowCaret
CharNextA
GetSysColorBrush
GetUserObjectInformationW
MapWindowPoints
DrawStateW
GetCapture
MapDialogRect
LoadCursorA
DefWindowProcA
SetWindowLongW
GetDlgItem
DispatchMessageW
IsClipboardFormatAvailable
CharLowerA
GetScrollInfo
SetClipboardData
SetCursor
EnumDisplaySettingsW
GetQueueStatus
GetScrollPos
KillTimer
SetWindowLongA
IsWindowEnabled
wvsprintfA
GetDC
SetMenuDefaultItem
SetActiveWindow
PostMessageA
FindWindowExA
GetParent
GetDlgItemTextW
LoadBitmapW
DialogBoxIndirectParamW
ShowCursor
OemToCharBuffA
IsWindow
ModifyMenuA
AttachThreadInput
CloseClipboard
ShowScrollBar
DrawIcon
SendInput
GetKeyboardLayoutList
GetCaretPos
CloseDesktop
TranslateAcceleratorW
SetRectEmpty
SystemParametersInfoA
GetClipboardFormatNameW
LoadAcceleratorsA
GetDlgCtrlID
SystemParametersInfoW
EmptyClipboard
CharNextW
DestroyMenu
GetClassNameA
LoadStringW
DrawTextExA
DrawTextA
WindowFromDC
GetClassInfoExW
PtInRect
WindowFromPoint
CheckMenuItem
GetWindow
GetMessageA
GetWindowTextA
SetCapture
SetMenu
TranslateMDISysAccel
OffsetRect
IsWindowVisible
FindWindowW
GetSystemMetrics
GetDlgItemInt
CopyAcceleratorTableW
TrackPopupMenuEx
CharToOemA
GetClipboardData
GetWindowLongA
CreateDialogIndirectParamW
CreateDialogIndirectParamA
advapi32
SetEntriesInAclW
OpenThreadToken
QueryServiceConfigW
GetAce
ReportEventA
InitializeSecurityDescriptor
MakeAbsoluteSD
RegSetValueExA
RegCreateKeyExW
RegCreateKeyExA
kernel32
CreateProcessA
DebugBreak
GetUserDefaultLangID
GetProcessHeaps
HeapSize
GetLocaleInfoA
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 139KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ