Static task
static1
Behavioral task
behavioral1
Sample
f063feffc4ccbc282eaa1fc56015abf1_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f063feffc4ccbc282eaa1fc56015abf1_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f063feffc4ccbc282eaa1fc56015abf1_JaffaCakes118
-
Size
580KB
-
MD5
f063feffc4ccbc282eaa1fc56015abf1
-
SHA1
07e2a0b39e327a177285ea99bfd1f5991bb35979
-
SHA256
00b064569eb301b67daafefb154b5cc3580c664844cd5b5df136eda71bd0f423
-
SHA512
904e3fcf8f5c187fe68b36d766da3e23a7fa5bcf85a486163ae006d4e7f34f60f3e5c132169b7277e40b25374d14e162cd68e2576c00596127cb92b6362fe0e0
-
SSDEEP
12288:Fddfs/FBfn2h0i0lMZlo327wAIcsJHjau3nmHOEdL/OG:JfsdBW0i2aovAI/Da6mHBO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f063feffc4ccbc282eaa1fc56015abf1_JaffaCakes118
Files
-
f063feffc4ccbc282eaa1fc56015abf1_JaffaCakes118.exe windows:4 windows x86 arch:x86
d1133d67470374d6825fb6c1cd934746
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_LoadImageW
ImageList_Duplicate
InitCommonControlsEx
ImageList_GetIcon
DrawStatusText
CreateStatusWindowA
ImageList_GetImageRect
ImageList_SetFlags
DrawInsert
ImageList_GetFlags
DrawStatusTextA
ImageList_LoadImageA
ImageList_Create
ImageList_GetBkColor
ImageList_Read
ImageList_SetOverlayImage
_TrackMouseEvent
MakeDragList
ImageList_BeginDrag
user32
UnregisterHotKey
IntersectRect
ModifyMenuA
LookupIconIdFromDirectory
ShowWindow
ShowCursor
DdeGetLastError
IsCharAlphaNumericW
EndDeferWindowPos
MessageBoxExW
DlgDirSelectExA
ScrollWindowEx
GetWindowRect
SetTimer
ReuseDDElParam
SetProcessWindowStation
FreeDDElParam
SetRectEmpty
SetWindowsHookW
wvsprintfA
DdeNameService
GetWindowDC
SetSysColors
FindWindowExA
GetScrollBarInfo
CharUpperA
SetParent
DdeConnectList
VkKeyScanExA
CreateWindowExA
FindWindowA
SetUserObjectInformationA
CallWindowProcA
DestroyIcon
OemToCharBuffW
ChangeDisplaySettingsExA
CreateIcon
GrayStringA
SendDlgItemMessageA
GetMenuInfo
GetWindowTextLengthW
CreateWindowStationA
GetCursor
ChildWindowFromPoint
CharToOemBuffW
FrameRect
CallWindowProcW
GetMenuItemID
EndPaint
DefWindowProcA
DrawFrameControl
RegisterClassA
RealGetWindowClass
OemToCharW
DefMDIChildProcW
SetDebugErrorLevel
ChangeDisplaySettingsExW
GetSysColor
DrawIcon
GrayStringW
KillTimer
MonitorFromPoint
CharToOemA
DestroyAcceleratorTable
RegisterClassExW
DdeAbandonTransaction
SetClassWord
ScrollDC
GetMenuItemCount
GetMessageExtraInfo
LoadImageW
RegisterClassExA
TranslateMDISysAccel
AppendMenuW
GetProcessDefaultLayout
OpenClipboard
ExitWindowsEx
PeekMessageW
RedrawWindow
SetPropA
TranslateAccelerator
EndMenu
PaintDesktop
GetNextDlgGroupItem
VkKeyScanW
CountClipboardFormats
RealChildWindowFromPoint
SetActiveWindow
DdeClientTransaction
MessageBoxW
InsertMenuW
CharLowerW
DefMDIChildProcA
MessageBoxA
RegisterWindowMessageW
DdeInitializeW
IsWindowUnicode
IsCharAlphaA
DestroyWindow
CharUpperBuffW
AppendMenuA
DdePostAdvise
ClientToScreen
kernel32
WriteFile
GetCommandLineW
GetStringTypeW
LCMapStringW
MoveFileW
TransactNamedPipe
GetStartupInfoA
GetPrivateProfileIntA
DeleteCriticalSection
CreateFileA
LeaveCriticalSection
LocalFlags
EnumCalendarInfoW
VirtualAlloc
GetUserDefaultLCID
CreateMutexA
GetLocaleInfoW
TlsAlloc
SetComputerNameA
GetModuleFileNameA
EnumTimeFormatsW
GetCurrentThread
CompareStringA
WaitNamedPipeA
UnhandledExceptionFilter
ReadFile
GetStdHandle
DebugActiveProcess
lstrcmpi
HeapCreate
GetDateFormatW
GetLocaleInfoA
GetModuleHandleA
InterlockedIncrement
TlsFree
FreeLibrary
SetThreadPriority
InterlockedDecrement
GetLastError
CreateDirectoryExW
TlsSetValue
GetProcessHeap
LCMapStringA
EnumSystemLocalesA
FlushFileBuffers
GetFileType
GetConsoleMode
SetStdHandle
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
LocalReAlloc
HeapSize
WriteConsoleW
GetCurrentProcess
GetTimeFormatA
InitializeCriticalSection
GetOEMCP
GetProcAddress
GetVolumeInformationW
LockResource
RtlUnwind
HeapReAlloc
IsValidCodePage
GetStartupInfoW
TerminateThread
GetEnvironmentStringsW
LocalFileTimeToFileTime
ReadConsoleInputW
WritePrivateProfileSectionA
GetTickCount
GetModuleFileNameW
HeapAlloc
GetACP
GetSystemTime
IsDebuggerPresent
CloseHandle
GetComputerNameA
GetTimeZoneInformation
GlobalFree
GetTempPathW
WaitNamedPipeW
GetVersion
FreeEnvironmentStringsA
GetConsoleOutputCP
SetThreadContext
GetVersionExA
lstrlenW
LoadLibraryA
GetCommandLineA
SetLocalTime
SetThreadAffinityMask
IsValidLocale
TerminateProcess
GetCurrentProcessId
SetEnvironmentVariableA
SetCriticalSectionSpinCount
SetFileAttributesW
CopyFileExA
GetEnvironmentStrings
GetStringTypeA
GetDateFormatA
SetConsoleCtrlHandler
QueryPerformanceCounter
ReadConsoleOutputAttribute
VirtualFree
DosDateTimeToFileTime
GetLogicalDriveStringsA
SetHandleCount
InterlockedExchange
FileTimeToLocalFileTime
SetLastError
HeapDestroy
ExitProcess
GlobalAlloc
WriteConsoleA
ReadConsoleOutputCharacterW
EnterCriticalSection
HeapFree
VirtualQuery
GetThreadLocale
MultiByteToWideChar
GetConsoleCP
SetFilePointer
WideCharToMultiByte
EnumCalendarInfoExA
GetConsoleScreenBufferInfo
FreeEnvironmentStringsW
GetProfileSectionA
GetWindowsDirectoryA
Sleep
GetSystemDirectoryA
TlsGetValue
CompareStringW
GetCPInfo
lstrcpy
GlobalHandle
OpenMutexA
GetCurrentThreadId
Sections
.text Size: 188KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 257KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ