Static task
static1
Behavioral task
behavioral1
Sample
f11dfbb4cf9a1ecbd057db18949fe3ae_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f11dfbb4cf9a1ecbd057db18949fe3ae_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f11dfbb4cf9a1ecbd057db18949fe3ae_JaffaCakes118
-
Size
100KB
-
MD5
f11dfbb4cf9a1ecbd057db18949fe3ae
-
SHA1
18d1940c29dcf6f92c0de2327bd57b5a07fc48cf
-
SHA256
e8464fe7b0803d041f98457eb69a1c7c118e6f736c144f28c679ef58034a980e
-
SHA512
efded56656baefcb4309f4f74d65fb546b32a4e0bbcd7c07de1472e79f4ce7541c2552f01d4d3f12dbb59a7908baac7410915a1c3c3b3ee67ff230e1bca7b0e4
-
SSDEEP
1536:SzxcMPyYfQxJVgux399nGBKMDwgWsrsm94x1Vg98uPGUt8bfgwlSU6bCz2gCzuYU:SryAQxEux8tDisuyRPGUt8E4+ktY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f11dfbb4cf9a1ecbd057db18949fe3ae_JaffaCakes118
Files
-
f11dfbb4cf9a1ecbd057db18949fe3ae_JaffaCakes118.exe windows:4 windows x86 arch:x86
f8c67d1ef1af3fcf991210a0a2ad9685
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
GetCurrentThreadId
VirtualAlloc
CreateFileA
lstrcpynA
CreateThread
lstrcatA
lstrcmpiA
GetACP
EnterCriticalSection
HeapAlloc
GetTickCount
GetThreadLocale
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetFileAttributesA
GetVersion
GetModuleHandleA
ExitProcess
GetOEMCP
FindResourceA
GetVersionExA
GetProcessHeap
GetStringTypeW
HeapDestroy
CloseHandle
SizeofResource
GetFileType
SetEndOfFile
GetFullPathNameA
GlobalAlloc
VirtualQuery
GetDiskFreeSpaceA
WriteFile
FindFirstFileA
CompareStringA
FreeResource
LocalAlloc
MulDiv
FormatMessageA
LocalReAlloc
GetUserDefaultLCID
GetCPInfo
GetLocaleInfoA
ExitThread
SetHandleCount
InitializeCriticalSection
CreateEventA
GetDateFormatA
SetErrorMode
GetCommandLineA
ResetEvent
GetLocalTime
SetEvent
GetLastError
LoadLibraryExA
LoadLibraryA
GetCurrentThread
GetSystemDefaultLangID
VirtualAllocEx
GetStdHandle
HeapFree
GetFileSize
LocalFree
LockResource
GlobalFindAtomA
GetEnvironmentStrings
RaiseException
lstrcmpA
lstrcpyA
FindClose
GetProcAddress
GetStringTypeA
GetStartupInfoA
EnumCalendarInfoA
GlobalDeleteAtom
ReadFile
Sleep
SetLastError
DeleteCriticalSection
SetFilePointer
VirtualFree
DeleteFileA
MoveFileExA
lstrlenA
GlobalAddAtomA
SetThreadLocale
WideCharToMultiByte
LoadResource
msvcrt
malloc
memmove
calloc
log
memcpy
advapi32
RegLoadKeyA
RegQueryInfoKeyA
RegQueryValueA
RegDeleteKeyA
user32
OffsetRect
ScreenToClient
SetWindowTextA
GetLastActivePopup
CreateIcon
DispatchMessageA
ShowWindow
ReleaseCapture
InvalidateRect
UnregisterClassA
GetClassNameA
InsertMenuA
SetWindowLongW
CharLowerA
DispatchMessageW
SetClipboardData
GetDesktopWindow
GetForegroundWindow
GetCapture
DrawFrameControl
MapVirtualKeyA
DestroyMenu
IsWindow
LoadCursorA
RegisterWindowMessageA
CharUpperBuffA
GetMessagePos
GetCursor
UpdateWindow
EnumChildWindows
GetParent
LoadKeyboardLayoutA
EnumWindows
SetTimer
GetKeyboardLayout
PeekMessageA
ShowOwnedPopups
SetPropA
FillRect
GetTopWindow
DrawEdge
EqualRect
DeleteMenu
IntersectRect
IsRectEmpty
PeekMessageW
GetWindowThreadProcessId
PtInRect
ScrollWindow
RegisterClassA
EndPaint
CreatePopupMenu
GetScrollPos
SetWindowPlacement
wsprintfA
GetFocus
IsIconic
GetWindowDC
SetClassLongA
ChildWindowFromPoint
BeginPaint
IsChild
ReleaseDC
SetMenuItemInfoA
MoveWindow
GetKeyboardType
SetScrollRange
IsWindowUnicode
GetKeyState
GetScrollRange
GetWindowRect
SetRect
IsWindowEnabled
CallWindowProcA
EmptyClipboard
SetParent
RemovePropA
GetMenuStringA
TranslateMDISysAccel
GetClipboardData
DrawTextA
GetSystemMetrics
TrackPopupMenu
GetKeyboardState
SetFocus
MessageBeep
MessageBoxA
GetDCEx
IsDialogMessageA
CallNextHookEx
EnumThreadWindows
InflateRect
DefWindowProcA
AdjustWindowRectEx
DefMDIChildProcA
InsertMenuItemA
GetScrollInfo
DefFrameProcA
GetActiveWindow
GetMenuState
GetIconInfo
DestroyIcon
GetKeyNameTextA
MapWindowPoints
GetSysColorBrush
GetMenuItemInfoA
GetMenu
DrawIconEx
IsDialogMessageW
ShowScrollBar
LoadBitmapA
GetMenuItemID
RedrawWindow
GetClassInfoA
GetPropA
SetCursor
CharNextA
GetWindow
GetSysColor
SendMessageW
FindWindowA
SetWindowLongA
SetCapture
DrawMenuBar
DrawIcon
WindowFromPoint
GetClientRect
GetSubMenu
RemoveMenu
GetWindowLongW
EnableMenuItem
CheckMenuItem
EnableWindow
PostQuitMessage
RegisterClipboardFormatA
SetScrollInfo
TranslateMessage
PostMessageA
DestroyWindow
GetDlgItem
SetScrollPos
GetWindowLongA
GetCursorPos
UnhookWindowsHookEx
GetClassLongA
CreateWindowExA
IsZoomed
SetWindowsHookExA
CharToOemA
SetForegroundWindow
DrawAnimatedRects
SetMenu
DestroyCursor
GetWindowPlacement
OemToCharA
GetSystemMenu
SystemParametersInfoA
GetWindowTextA
OpenClipboard
WaitMessage
ClientToScreen
SetWindowPos
GetKeyboardLayoutNameA
GetKeyboardLayoutList
FrameRect
KillTimer
CharNextW
GetMenuItemCount
ActivateKeyboardLayout
IsWindowVisible
GetDC
CloseClipboard
LoadStringA
LoadIconA
shlwapi
SHQueryValueExA
SHEnumValueA
Sections
CODE Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE