Static task
static1
Behavioral task
behavioral1
Sample
201dc1311656e7028fe3ab7648c08fb8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
201dc1311656e7028fe3ab7648c08fb8_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
201dc1311656e7028fe3ab7648c08fb8_JaffaCakes118
-
Size
218KB
-
MD5
201dc1311656e7028fe3ab7648c08fb8
-
SHA1
728c3800c2408ffece5d30e30a9346f982332326
-
SHA256
5ba36a204f0cc6fd8b9c8bd5d6527daceebd9912dd4040c8c5f72ad2e9439db4
-
SHA512
5cd91b0070d2348f8606903ccaad8119fa1bf5883d9845f5c08fd5f5cdf8f244368830be9d2491f8193c31be2f425cb0c1ab08af9a3a46c16fe4c2890f691039
-
SSDEEP
3072:8aHt/kuzQQR8TsCRvd10WuBLM4OkHGP5iD5gTvPN+e:7N/iQWTsFNLM/5QDKv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 201dc1311656e7028fe3ab7648c08fb8_JaffaCakes118
Files
-
201dc1311656e7028fe3ab7648c08fb8_JaffaCakes118.exe windows:4 windows x86 arch:x86
740a5445c2a94f9758201fceceb39eb2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
HeapFree
HeapAlloc
ExitProcess
TerminateProcess
HeapReAlloc
HeapSize
GetCPInfo
GetStartupInfoA
RaiseException
GetTimeZoneInformation
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetACP
GetOEMCP
GetModuleHandleA
RtlUnwind
DeleteFileA
SetEndOfFile
LCMapStringW
VirtualAlloc
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
SetStdHandle
GetLocaleInfoA
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
lstrcmpiA
GetCurrentThread
MulDiv
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
GlobalGetAtomNameA
GlobalAddAtomA
FileTimeToLocalFileTime
FileTimeToSystemTime
SetErrorMode
WritePrivateProfileStringA
GetVersionExA
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SetLastError
GlobalFlags
GetFileTime
GetFileSize
GetFileAttributesA
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
FindFirstFileA
FindClose
lstrcpyA
LoadLibraryA
GetProcAddress
FreeLibrary
HeapCreate
InterlockedDecrement
InterlockedIncrement
UnlockFile
VirtualFree
LockFile
GetVersion
lstrcatA
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
GetLastError
LocalFree
CloseHandle
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
SetUnhandledExceptionFilter
LCMapStringA
GetFileType
HeapDestroy
WinExec
LoadResource
GetTempPathA
GetSystemDirectoryA
GetPrivateProfileStringA
GetModuleFileNameA
GetCurrentThreadId
FindResourceA
LockResource
GlobalFree
GlobalUnlock
GlobalLock
user32
ReleaseDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GetDC
GrayStringA
PostQuitMessage
ShowOwnedPopups
SetCursor
MessageBoxA
GetCursorPos
ValidateRect
TranslateMessage
GetMessageA
CharUpperA
LoadStringA
GetClassNameA
PtInRect
ClientToScreen
GetDesktopWindow
LoadCursorA
GetSysColorBrush
DestroyMenu
FindWindowA
InvalidateRect
ReleaseCapture
WindowFromPoint
SetRectEmpty
LoadAcceleratorsA
TranslateAcceleratorA
LoadMenuA
SetMenu
ReuseDDElParam
UnpackDDElParam
BringWindowToTop
PostMessageA
UpdateWindow
SendDlgItemMessageA
SystemParametersInfoA
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
GetFocus
SetFocus
DeferWindowPos
BeginDeferWindowPos
CopyRect
ScreenToClient
ScrollWindow
SetScrollRange
GetScrollPos
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetMenu
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
SetPropA
UnhookWindowsHookEx
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetWindow
GetWindowRect
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
wsprintfA
EnableWindow
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
LoadIconA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
ShowWindow
SetWindowTextA
IsDialogMessageA
GetMenuCheckMarkDimensions
LoadBitmapA
EndDeferWindowPos
IsWindowVisible
AdjustWindowRectEx
EqualRect
SetScrollInfo
GetTopWindow
SetScrollPos
ShowScrollBar
UnregisterClassA
gdi32
SetBkColor
CreateBitmap
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SetTextColor
DeleteObject
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
shell32
DragFinish
FindExecutableA
DragQueryFileA
comctl32
ord17
ImageList_Destroy
Sections
.text Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE