Static task
static1
Behavioral task
behavioral1
Sample
d67aad8d74b1cfc09bfb897a83ecd80d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d67aad8d74b1cfc09bfb897a83ecd80d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d67aad8d74b1cfc09bfb897a83ecd80d_JaffaCakes118
-
Size
162KB
-
MD5
d67aad8d74b1cfc09bfb897a83ecd80d
-
SHA1
f947b09836cde1229fe068007a699bdb96c8a5f9
-
SHA256
0eda6abb9c8c4f2ed2bdc76791c749412af1a56083f21100e8a1c7d7d1ede23b
-
SHA512
0c924e2234e0fec69bacd4981b38c10cbc702f96d91f40a7417c487fad174e7c4016ff98e8f3ef30ee57bde14b8e73380897cf757bed489ac19eb82feb89c656
-
SSDEEP
3072:8PyCt4CRzcJefyCj4s4Ln79U/46tejvxh/YqmwSf6KChmEFlsaN1ecxu/Vq3:CyKQef/4sGxjvxhrKklsG1esu/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d67aad8d74b1cfc09bfb897a83ecd80d_JaffaCakes118
Files
-
d67aad8d74b1cfc09bfb897a83ecd80d_JaffaCakes118.exe windows:4 windows x86 arch:x86
10ab2cc3e72d02f8c5fa50c2b0c6a204
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
gdi32
CreateFontIndirectW
GetDeviceCaps
DeleteObject
user32
SetWindowTextW
RegisterClassExW
GetClassInfoExW
TranslateMessage
DestroyWindow
DispatchMessageW
GetClientRect
MessageBoxW
GetWindowInfo
SetWindowPos
PeekMessageW
GetParent
GetDlgItemTextW
SetDlgItemTextW
CreateWindowExW
LoadCursorW
GetWindowTextLengthW
MapWindowPoints
GetWindowRect
GetWindow
SystemParametersInfoW
BeginPaint
EndPaint
GetDC
GetDlgItem
SetCapture
EndDialog
ole32
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitialize
oleacc
LresultFromObject
CreateStdAccessibleObject
kernel32
LoadLibraryExW
FreeLibrary
InterlockedExchange
ExitProcess
GetVersionExW
GetStringTypeA
GetModuleFileNameA
GetStartupInfoA
LCMapStringA
LocalAlloc
GetModuleFileNameW
WriteConsoleInputVDMA
WriteFile
WritePrivateProfileSectionW
GetDriveTypeW
lstrlenA
GetCommandLineW
LoadLibraryA
DeleteCriticalSection
LocalFree
lstrcmpA
GetFileSize
TlsSetValue
LoadLibraryW
GetModuleHandleA
GetProcessHandleCount
FindResourceW
GetConsoleOutputCP
GetFileAttributesW
ReadFile
GetVersion
CloseHandle
GetConsoleMode
GetCPInfo
GetStdHandle
IsDebuggerPresent
IsProcessorFeaturePresent
SetStdHandle
GetCurrentThreadId
GetProcessHeap
UnhandledExceptionFilter
GetCurrentProcessId
SetLastError
SetFilePointer
GetConsoleCP
GetThreadLocale
HeapSize
CreateFileA
GetLastError
VirtualAlloc
SizeofResource
EnumResourceNamesA
FlushInstructionCache
CopyFileW
RaiseException
GetCurrentProcess
InterlockedCompareExchange
GetOEMCP
GetLocaleInfoA
GetSystemTimeAsFileTime
WideCharToMultiByte
GetEnvironmentStrings
GetSystemDirectoryW
GetProcAddress
MulDiv
SetUnhandledExceptionFilter
GetACP
GetCommandLineA
TlsAlloc
CreateSemaphoreW
VirtualFree
CreateProcessW
TlsGetValue
InterlockedDecrement
GetVersionExA
WriteConsoleA
RtlUnwind
GetTickCount
HeapDestroy
FreeEnvironmentStringsW
DeleteFileW
SetHandleCount
LCMapStringW
QueryPerformanceCounter
GetStringTypeW
GetEnvironmentStringsW
InterlockedIncrement
LockResource
LeaveCriticalSection
HeapAlloc
HeapCreate
Sleep
WaitForSingleObject
CreateFileMappingW
CreateFileW
lstrcmpiW
FlushFileBuffers
GetFileType
WriteConsoleW
TlsFree
HeapReAlloc
GetStartupInfoW
HeapFree
LoadResource
InitializeCriticalSection
GetModuleHandleW
FreeEnvironmentStringsA
lstrlenW
shell32
SHGetSpecialFolderLocation
ShellExecuteW
SHGetPathFromIDListW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
Sections
.text Size: 85KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idive Size: 1024B - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ