Static task
static1
Behavioral task
behavioral1
Sample
ec2111371120bb9780a3f71c0a6e0845_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec2111371120bb9780a3f71c0a6e0845_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ec2111371120bb9780a3f71c0a6e0845_JaffaCakes118
-
Size
648KB
-
MD5
ec2111371120bb9780a3f71c0a6e0845
-
SHA1
983fe341846e5f39715f01368ac6c88e953dc91e
-
SHA256
04dba681496aaf436c4da5cee42c394472a3270b4ebcb7c095febd57c5a962a1
-
SHA512
a6958d99d259452826c3171d3ec3063dff7695bb9531f0579f4b9356f5a4fc658c66ea4314d65ebbb2500dc1102f9fdf689a4a61e0c7be16a4506747b408d4ed
-
SSDEEP
12288:LWHWNPSU4u7Qw3I/WnNKaM+ppsIS4dhyBaNyhq:8WN57QaI+NKa/XrS+hUaNCq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ec2111371120bb9780a3f71c0a6e0845_JaffaCakes118
Files
-
ec2111371120bb9780a3f71c0a6e0845_JaffaCakes118.exe windows:4 windows x86 arch:x86
330ed4c9f3f1b17324364e6c521af5c8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
CreateCursor
VkKeyScanW
DdeGetData
LoadImageW
GetInputDesktop
LockWindowUpdate
RemovePropA
GetDlgItemInt
MessageBoxW
SendDlgItemMessageW
VkKeyScanA
AppendMenuW
SetProcessWindowStation
MessageBeep
RegisterClassA
OpenDesktopA
TabbedTextOutA
SetWindowsHookExW
DestroyWindow
CheckRadioButton
WindowFromPoint
GetSystemMenu
GetForegroundWindow
ShowWindow
SetShellWindow
DdeReconnect
OemToCharW
GetPropW
CreateWindowExA
GetComboBoxInfo
SetTimer
SetUserObjectInformationA
DefWindowProcA
GetTabbedTextExtentW
SetCursor
DrawIcon
RegisterClassExA
gdi32
GetPixel
PolylineTo
SetPaletteEntries
TextOutA
PatBlt
SetICMProfileW
GetBkMode
SetBitmapDimensionEx
CancelDC
CopyMetaFileW
GetLogColorSpaceW
GetCharWidthW
GdiPlayScript
SetDIBitsToDevice
SetBkColor
SetAbortProc
SetMagicColors
LineTo
LineDDA
comctl32
InitMUILanguage
ImageList_SetBkColor
InitCommonControlsEx
ImageList_SetImageCount
ImageList_SetFlags
CreatePropertySheetPageW
ImageList_GetImageInfo
ImageList_GetImageRect
CreateUpDownControl
kernel32
HeapCreate
TlsGetValue
GetFileType
lstrcpyn
WriteConsoleA
SetUnhandledExceptionFilter
LocalFlags
HeapSize
FindResourceA
SetFilePointer
GetProfileSectionA
GetLastError
FormatMessageW
ReadConsoleOutputA
GetACP
OpenFileMappingA
CreateFileA
TlsFree
GetConsoleOutputCP
GetPrivateProfileStringA
DeleteCriticalSection
CreateToolhelp32Snapshot
CommConfigDialogA
GetThreadPriorityBoost
GetCommandLineA
GetLogicalDrives
EnumDateFormatsExW
FindAtomA
WritePrivateProfileSectionW
HeapReAlloc
TerminateProcess
GetConsoleMode
EnumSystemLocalesW
SetComputerNameA
GlobalGetAtomNameA
GlobalFree
GetCurrentProcess
GetDiskFreeSpaceA
EnumDateFormatsExA
GetModuleHandleA
GetTickCount
SetEnvironmentVariableA
TransactNamedPipe
EnterCriticalSection
GetCalendarInfoA
CompareStringW
FindFirstFileExW
CreateThread
GetStartupInfoA
Sleep
GetProfileIntA
GetEnvironmentStrings
SetStdHandle
GetStringTypeW
GetProcessAffinityMask
VirtualAlloc
FlushFileBuffers
GetProcAddress
GetNumberFormatW
GetUserDefaultLCID
GetCPInfo
GetModuleHandleW
GetOEMCP
VirtualFree
WideCharToMultiByte
GetConsoleCP
GetVersionExA
GetLocaleInfoA
GetCurrencyFormatW
GetSystemDirectoryA
GetProcessHeap
IsValidCodePage
HeapDestroy
lstrlenW
EnumSystemCodePagesW
ReadFile
LCMapStringA
FreeEnvironmentStringsW
FindFirstFileW
InterlockedDecrement
GetFullPathNameA
MultiByteToWideChar
SetConsoleCtrlHandler
GetCurrentThreadId
DuplicateHandle
SetLastError
FileTimeToLocalFileTime
OutputDebugStringW
UnhandledExceptionFilter
IsValidLocale
SetEnvironmentVariableW
InterlockedIncrement
IsDebuggerPresent
OpenMutexA
CreateMutexA
GetMailslotInfo
GetStringTypeExW
LeaveCriticalSection
RtlZeroMemory
GetLogicalDriveStringsA
GlobalFlags
EnumSystemLocalesA
QueryPerformanceCounter
FormatMessageA
GetPrivateProfileSectionA
GetLocaleInfoW
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
InterlockedExchange
CompareStringA
GetDiskFreeSpaceW
GetFileAttributesExW
SetHandleCount
GetSystemTimeAsFileTime
GetStringTypeA
GetTimeFormatA
RtlUnwind
HeapAlloc
FreeLibrary
TlsAlloc
CloseHandle
GetDateFormatA
GetCurrentProcessId
GetModuleFileNameA
LoadLibraryA
FreeEnvironmentStringsA
GetEnvironmentStringsW
GetStdHandle
VirtualQuery
HeapFree
ExitProcess
TlsSetValue
GetCurrentThread
GetNamedPipeHandleStateW
WriteConsoleW
LCMapStringW
WriteFile
comdlg32
FindTextW
Sections
.text Size: 260KB - Virtual size: 256KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 251KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 120KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ