Static task
static1
Behavioral task
behavioral1
Sample
f17f19df85826d079aa20d5956d3dc8e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f17f19df85826d079aa20d5956d3dc8e_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f17f19df85826d079aa20d5956d3dc8e_JaffaCakes118
-
Size
162KB
-
MD5
f17f19df85826d079aa20d5956d3dc8e
-
SHA1
5623b5f05a270f9d40ab26dad3b0b0107d5f675a
-
SHA256
c6f703c296d287f2fb8f929daf9c82798274aabdeb806fa316340f389e952bcf
-
SHA512
2dd835cdbd6cc4c799a02c0ab00cdd8717130b604824f6fae6033158b6739c1289e6b62c990192558a8318e5f368ec3d8810912d1d04c08c056d4ef645af3d05
-
SSDEEP
3072:s+OspUfXN25Yiy0ZH8mMZKfypLzjilkznhXoXUexgdGHgoRfUj:s+BpIzuZFMZKfy1C0hXWUFQHgoKj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f17f19df85826d079aa20d5956d3dc8e_JaffaCakes118
Files
-
f17f19df85826d079aa20d5956d3dc8e_JaffaCakes118.exe windows:4 windows x86 arch:x86
dade4023bd93ce19b67e41f30baa3e58
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHFileOperationA
oleaut32
OleLoadPicture
VariantCopyInd
shlwapi
PathIsContentTypeA
SHQueryValueExA
SHStrDupA
SHSetValueA
SHGetValueA
PathIsDirectoryA
PathGetCharTypeA
SHQueryInfoKeyA
comctl32
ImageList_Add
ImageList_Draw
ImageList_DragShowNolock
ImageList_Create
ImageList_Destroy
ImageList_DrawEx
ImageList_Read
ImageList_Write
gdi32
GetRgnBox
SetBkMode
CopyEnhMetaFileA
CreatePenIndirect
CreateFontIndirectA
SelectObject
SelectPalette
CreateCompatibleDC
GetClipBox
CreateBrushIndirect
advapi32
GetUserNameA
user32
GetWindowRect
ChildWindowFromPoint
UnregisterClassA
GetMenu
IsZoomed
MessageBeep
SetScrollInfo
SetPropA
GetKeyboardState
RegisterWindowMessageA
IsIconic
ActivateKeyboardLayout
GetMenuItemCount
GetActiveWindow
GetWindowPlacement
SendMessageA
TranslateMDISysAccel
CreateIcon
RedrawWindow
SetActiveWindow
CharToOemA
GetMenuState
CharNextW
GetKeyboardLayout
WaitMessage
GetClassInfoA
MoveWindow
CharLowerA
InsertMenuItemA
DefMDIChildProcA
IsWindow
KillTimer
GetMenuItemInfoA
GetLastActivePopup
SetForegroundWindow
ShowOwnedPopups
DrawTextA
SetScrollPos
IntersectRect
EmptyClipboard
SetClassLongA
GetIconInfo
DrawFrameControl
DefWindowProcA
DrawIcon
DrawEdge
LoadStringA
TrackPopupMenu
SetWindowTextA
SetWindowPlacement
GetSystemMetrics
GetKeyboardLayoutList
LoadKeyboardLayoutA
DrawAnimatedRects
InsertMenuA
GetScrollRange
GetClipboardData
SystemParametersInfoA
GetClassLongA
GetCursor
EnumThreadWindows
GetDlgItem
ScreenToClient
MessageBoxA
ShowWindow
GetClientRect
PeekMessageW
FillRect
AdjustWindowRectEx
EnumWindows
MapVirtualKeyA
EnableScrollBar
SetTimer
CloseClipboard
SetCursor
OpenClipboard
DestroyMenu
PostMessageA
CreatePopupMenu
GetMenuStringA
DispatchMessageW
GetKeyboardType
BeginPaint
GetKeyNameTextA
EnableWindow
SetMenu
SetWindowPos
DrawMenuBar
EndPaint
MapWindowPoints
RegisterClassA
SetClipboardData
CharUpperBuffA
DeleteMenu
GetKeyboardLayoutNameA
UnhookWindowsHookEx
SetMenuItemInfoA
GetSubMenu
GetDC
DestroyCursor
GetWindowThreadProcessId
LoadCursorA
FrameRect
InflateRect
GetFocus
GetSystemMenu
SetWindowsHookExA
GetSysColor
CharNextA
SetFocus
UpdateWindow
GetKeyState
CallWindowProcA
msvcrt
srand
pow
tolower
memcpy
malloc
strncmp
log
atan
ole32
CoGetObjectContext
CoCreateInstanceEx
WriteClassStm
StgCreateDocfileOnILockBytes
kernel32
GetCommandLineA
ExitThread
LocalAlloc
VirtualAlloc
GetLocaleInfoA
LoadLibraryA
LockResource
EnterCriticalSection
ExitProcess
GetProcAddress
SizeofResource
GetModuleHandleA
SetLastError
comdlg32
GetFileTitleA
version
VerInstallFileA
GetFileVersionInfoSizeA
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: 512B - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE