Static task
static1
Behavioral task
behavioral1
Sample
d1acdfb5b72389d344febdafc9c3fb27_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d1acdfb5b72389d344febdafc9c3fb27_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d1acdfb5b72389d344febdafc9c3fb27_JaffaCakes118
-
Size
193KB
-
MD5
d1acdfb5b72389d344febdafc9c3fb27
-
SHA1
d67ecd616a05deaebc54698dbe0cbd2db0ca8a15
-
SHA256
69ae7d81eb9d62b16a92c83c337f713c43c5c31b43d85b5ee3d82411381bf0fb
-
SHA512
f08c537f35bcd87d76c64bec876e4281bf7ab52ace2491844005a80e9d6691f2e3abead39aa5066731ed940aead2e427a98f1efbcd20515e5cac587cd1df5c86
-
SSDEEP
3072:QXebiNyM8ceOGd/L6Tr27tErhSAnvG6FJgztyvhobyv9Feyq+imnDXZKsz:QfivOI2+QhSANJg50KbuFeyq+imnDf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d1acdfb5b72389d344febdafc9c3fb27_JaffaCakes118
Files
-
d1acdfb5b72389d344febdafc9c3fb27_JaffaCakes118.exe windows:4 windows x86 arch:x86
69fb56e396bc774816fde7e06eefa8a2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
ole32
CoCreateInstance
CoGetClassObject
GetHGlobalFromILockBytes
StgCreateDocfileOnILockBytes
CLSIDFromProgID
OleGetAutoConvert
ReleaseStgMedium
RegisterDragDrop
StgOpenStorageOnILockBytes
OleRun
StringFromCLSID
OleDuplicateData
CoTaskMemAlloc
CLSIDFromString
CoGetMalloc
CreateStreamOnHGlobal
OleRegGetUserType
CoCreateGuid
ProgIDFromCLSID
RevokeDragDrop
CoTaskMemFree
GetHGlobalFromStream
CoFreeUnusedLibraries
CreateILockBytesOnHGlobal
kernel32
SearchPathW
FindResourceExA
GetVersionExW
CreateFiberEx
LockFile
SetCommConfig
SetEndOfFile
FlushFileBuffers
GetUserDefaultLangID
FileTimeToLocalFileTime
CompareStringW
EnumResourceNamesW
FileTimeToSystemTime
GetProfileStringW
UnlockFile
GetVolumeInformationW
FlushFileBuffers
GetFileTime
IsDBCSLeadByte
LocalAlloc
GetFileAttributesA
GetSystemTime
VerLanguageNameW
GetFileType
GetSystemDirectoryW
gdi32
ExtCreatePen
GetBkColor
PolyBezier
PlgBlt
StrokePath
CreatePen
SetTextColor
RoundRect
FlattenPath
CreateFontIndirectA
GetBitmapBits
GetPath
AnimatePalette
SetStretchBltMode
SetDIBits
shlwapi
PathStripToRootW
PathIsRelativeW
PathIsURLW
PathCanonicalizeW
PathIsRootW
PathCombineW
comctl32
ImageList_Add
ImageList_Create
ImageList_DrawEx
ImageList_GetIconSize
ImageList_Destroy
rpcrt4
NdrClientCall
RpcStringBindingComposeA
RpcBindingFromStringBindingA
RpcBindingSetAuthInfoA
RpcStringFreeA
comdlg32
GetFileTitleA
user32
SetWindowsHookExW
CallNextHookEx
IsClipboardFormatAvailable
SetClipboardData
MonitorFromWindow
DestroyIcon
SetScrollRange
UnhookWindowsHookEx
ClipCursor
ChildWindowFromPoint
RegisterClassW
EmptyClipboard
DrawEdge
WinHelpW
ToAscii
DestroyCursor
DefWindowProcW
SetWindowPos
GetSysColorBrush
GetSysColor
Sections
.text Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lib Size: 512B - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ