Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d10444d993a45e22aede0b49339b5007.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d10444d993a45e22aede0b49339b5007.exe
Resource
win10v2004-20250207-en
General
-
Target
JaffaCakes118_d10444d993a45e22aede0b49339b5007
-
Size
266KB
-
MD5
d10444d993a45e22aede0b49339b5007
-
SHA1
2f0a3ed32407d6f4f8e72fb03c41795d32b2b15b
-
SHA256
2fb65f1e343a0890843822bc2a3a8d2a3ef6b9e35dbaaf1a3aefda2e4d111865
-
SHA512
05ec62b254739fe452d9849fcc3ddeb1799fdf08ce11292620806ede20427f432a4aa7ce0925a9d5eee217290dc97109dd045380ebba56e8f7754330a188b269
-
SSDEEP
6144:75yCwdzE+tQ8ec+C9cMLnQsMm0+j/3vyO2y8VsolFn:VypzE2j9cMssMm0O78muFn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_d10444d993a45e22aede0b49339b5007
Files
-
JaffaCakes118_d10444d993a45e22aede0b49339b5007.exe windows:4 windows x86 arch:x86
503409847ea7cce677dad1fc98cf9eb0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VarUI4FromStr
user32
GetDlgCtrlID
CreateWindowExW
DrawIconEx
GetWindow
CreateDialogIndirectParamW
LoadImageW
CopyRect
CallWindowProcW
GetMenu
GetSystemMetrics
EnableWindow
SetDlgItemTextW
DialogBoxParamW
SetFocus
SystemParametersInfoW
FindWindowW
GetMonitorInfoW
SetWindowLongW
GetKeyState
MapWindowPoints
SetForegroundWindow
CharNextW
DestroyWindow
SendMessageTimeoutW
KillTimer
DefWindowProcW
WindowFromPoint
LoadCursorW
DrawFocusRect
IsIconic
DispatchMessageW
GetClientRect
ReleaseDC
SendMessageW
GetWindowRect
SetScrollInfo
SetCursor
DeferWindowPos
ClientToScreen
UnregisterClassA
LoadStringW
GetTopWindow
GetClassInfoExW
PostMessageW
WindowFromDC
ScreenToClient
InvalidateRect
ScrollWindowEx
BeginPaint
DrawTextW
GetDlgItem
FindWindowExW
GetSystemMenu
LoadIconW
FillRect
RedrawWindow
PtInRect
IsWindow
SetWindowPos
GetForegroundWindow
GetIconInfo
GetWindowThreadProcessId
AttachThreadInput
EnableMenuItem
SetTimer
BeginDeferWindowPos
GetSysColor
GetWindowLongW
EndDeferWindowPos
TranslateMessage
GetDesktopWindow
IntersectRect
GetParent
AdjustWindowRectEx
SetRect
EndPaint
GetMessageW
wsprintfW
DestroyIcon
SetWindowTextW
GetDC
MonitorFromRect
EndDialog
ShowWindow
EqualRect
PeekMessageW
RegisterClassExW
GetAncestor
UpdateWindow
GetNextDlgTabItem
MonitorFromWindow
GetScrollInfo
GetCursorPos
GetWindowTextW
gdi32
CreateDCW
GetClipBox
CreateBitmap
GetObjectW
Rectangle
SelectObject
BitBlt
SetBkMode
SetWindowOrgEx
GetTextExtentPoint32W
TextOutW
SetBkColor
GetStockObject
CreateCompatibleDC
CreateSolidBrush
GetTextMetricsW
SetTextJustification
DeleteObject
GetMapMode
DeleteDC
SetMapMode
StretchBlt
CreateFontIndirectW
DPtoLP
GetDeviceCaps
SetTextColor
EnumFontFamiliesExW
CreateCompatibleBitmap
SetTextAlign
ole32
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
comctl32
InitCommonControlsEx
kernel32
FreeLibrary
GetSystemTimeAsFileTime
IsDebuggerPresent
GetModuleHandleW
LoadResource
lstrlenA
LockResource
EnterCriticalSection
ReleaseMutex
GetCurrentThreadId
LoadLibraryExW
CloseHandle
GetACP
lstrcmpiW
CreateFileW
GetProcessHeap
VirtualFree
FindResourceW
FreeResource
DeleteCriticalSection
SetLastError
FindResourceExW
SizeofResource
LeaveCriticalSection
GetFileSize
RaiseException
FlushInstructionCache
HeapFree
MulDiv
HeapAlloc
OutputDebugStringW
VirtualAlloc
IsProcessorFeaturePresent
ReadFile
HeapSize
LocalAlloc
UnhandledExceptionFilter
HeapReAlloc
HeapDestroy
lstrlenW
CreateMutexW
WideCharToMultiByte
SetUnhandledExceptionFilter
CreateThread
VirtualAllocEx
esent
JetStopServiceInstance
JetCreateTableColumnIndex
JetDeleteTable
JetBeginExternalBackupInstance
JetResetTableSequential
JetEndSession
JetComputeStats
JetGetTableIndexInfo
JetRollback
JetResetSessionContext
JetCreateTableColumnIndex2
JetDetachDatabase
JetStopBackupInstance
kbdcz1
KbdLayerDescriptor
Sections
.gQnQ Size: 1KB - Virtual size: 6KB
IMAGE_SCN_MEM_READ
.cJWsCtP Size: 2KB - Virtual size: 21KB
IMAGE_SCN_MEM_READ
.rImQRKp Size: 1024B - Virtual size: 32KB
IMAGE_SCN_MEM_READ
.SvqVDAb Size: 512B - Virtual size: 9KB
IMAGE_SCN_MEM_READ
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.UAyg Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zHuo Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ubjrGV Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 257KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.JExHQ Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.FbIAYy Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 210KB - Virtual size: 210KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.DxneYo Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.IGrtN Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.OESSyXf Size: 512B - Virtual size: 457B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ