Static task
static1
Behavioral task
behavioral1
Sample
e7c0f4cefcc87f19f6b648ee0df83abd_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
e7c0f4cefcc87f19f6b648ee0df83abd_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e7c0f4cefcc87f19f6b648ee0df83abd_JaffaCakes118
-
Size
2.0MB
-
MD5
e7c0f4cefcc87f19f6b648ee0df83abd
-
SHA1
18744c9db04579a341172510730b9d73bc48a2d1
-
SHA256
0021f4daca85ce73ce7c287ca869d08111a79f09161d6d98e86cd37617e63728
-
SHA512
3833c090a03c80a33ebfa14b3050fe94a399c7770464436606ca5e586876365e719c81e662292b7d90b5da6d1b4616cc861d5e508149e56adcc271c698ac55c9
-
SSDEEP
49152:Cfcvl0ZvxnHs7KFpJAscGBy6NvyWQpk7bM4YvlBnWTn:CvZgGBy6N6CM1vlBn6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e7c0f4cefcc87f19f6b648ee0df83abd_JaffaCakes118
Files
-
e7c0f4cefcc87f19f6b648ee0df83abd_JaffaCakes118.exe windows:4 windows x86 arch:x86
0f1c6e1c359531ce80ff1b4fdd7f3c01
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
SetErrorMode
GetTickCount
RtlUnwind
RaiseException
HeapAlloc
HeapFree
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetProcessHeap
GetStartupInfoA
GetFileType
HeapSize
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
SetHandleCount
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetOEMCP
GetCPInfo
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetFileTime
CreateFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetPrivateProfileStringA
WritePrivateProfileStringA
GetCurrentProcessId
lstrcmpA
InterlockedDecrement
GetModuleFileNameW
GetThreadLocale
InterlockedIncrement
FreeResource
GetCurrentThreadId
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
GetUserDefaultLangID
GetLocaleInfoA
MoveFileExA
GetShortPathNameA
CreateMutexA
ExitProcess
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetSystemDefaultLangID
CreateProcessA
WaitForSingleObject
LocalFree
OpenProcess
CloseHandle
GetExitCodeProcess
GetModuleHandleA
GetProcAddress
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
WinExec
CopyFileA
SetLastError
FormatMessageA
GetCurrentDirectoryA
GetVersionExA
GetModuleFileNameA
FindNextFileA
CreateDirectoryA
SetFileAttributesA
GetSystemDirectoryA
lstrcatA
FindClose
GetFileAttributesA
lstrcpyA
GetCurrentProcess
GetFileSize
FindFirstFileA
GlobalGetAtomNameA
Sleep
lstrlenA
CompareStringW
CompareStringA
GetVersion
GetLastError
MultiByteToWideChar
InterlockedExchange
DeleteFileA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SetStdHandle
SizeofResource
user32
CopyAcceleratorTableA
IsRectEmpty
SetRect
InvalidateRgn
UnregisterClassA
GetNextDlgGroupItem
RegisterClipboardFormatA
PostThreadMessageA
SetFocus
GetWindowTextLengthA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
MapWindowPoints
GetKeyState
SetForegroundWindow
GetMenu
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetMenuItemID
GetMenuItemCount
GetSubMenu
PostQuitMessage
DestroyMenu
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetWindowDC
OffsetRect
DrawIconEx
DrawFrameControl
ReleaseCapture
DestroyCursor
SetCapture
GetCapture
ClientToScreen
DestroyIcon
UpdateWindow
PeekMessageA
TranslateMessage
DispatchMessageA
LoadImageA
LoadAcceleratorsA
SetParent
TranslateAcceleratorA
RegisterWindowMessageA
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
LoadIconA
DrawIcon
MessageBeep
SetWindowLongA
CopyIcon
GetSysColor
GetMessagePos
SetTimer
ScreenToClient
InflateRect
PtInRect
DrawTextA
ExitWindowsEx
BroadcastSystemMessageA
ReleaseDC
GetDC
FrameRect
FillRect
EqualRect
IsWindow
SetWindowPos
GetSystemMetrics
GetClientRect
WindowFromPoint
GetMessageA
KillTimer
InvalidateRect
GetWindowRect
SetWindowRgn
IsIconic
PostMessageA
GetParent
CharUpperA
GetFocus
EnumChildWindows
SetCursor
GetClassNameA
GetWindowTextA
LoadCursorA
SendMessageA
EnableWindow
GetSysColorBrush
SetWindowContextHelpId
MapDialogRect
SetMenuItemBitmaps
GetCursorPos
ValidateRect
EndPaint
BeginPaint
GrayStringA
DrawTextExA
TabbedTextOutA
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
CharNextA
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
WinHelpA
IsChild
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
gdi32
SetDIBitsToDevice
ExtSelectClipRgn
GetClipBox
SetBkColor
CreateBitmap
RectVisible
SetTextColor
CombineRgn
GetDeviceCaps
GetBkColor
GetTextColor
SaveDC
RestoreDC
SetMapMode
LineTo
MoveToEx
SelectClipRgn
GetViewportExtEx
GetWindowExtEx
PtVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetMapMode
GetRgnBox
CreateRectRgnIndirect
PtInRegion
GetTextExtentPoint32A
CreateFontIndirectA
GetStockObject
SetBkMode
CreateCompatibleBitmap
CreateSolidBrush
CreateRectRgn
Arc
CreatePen
CreateCompatibleDC
SelectObject
SetStretchBltMode
StretchBlt
DeleteDC
DeleteObject
BitBlt
CreateDIBSection
GetObjectA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegEnumKeyA
RegOpenKeyA
RegEnumKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegQueryValueA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shlwapi
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
OleFlushClipboard
CoRevokeClassObject
OleIsCurrentClipboard
CoRegisterMessageFilter
oleaut32
SystemTimeToVariantTime
SysFreeString
VarBstrFromDate
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
OleCreateFontIndirect
SysStringLen
SysAllocStringByteLen
SafeArrayDestroy
SysAllocString
VariantCopy
VariantTimeToSystemTime
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
Sections
.text Size: 824KB - Virtual size: 822KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 196KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 984KB - Virtual size: 984KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE