Static task
static1
Behavioral task
behavioral1
Sample
f2bbdfc4082e93fff71208388fabfbb6_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f2bbdfc4082e93fff71208388fabfbb6_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f2bbdfc4082e93fff71208388fabfbb6_JaffaCakes118
-
Size
119KB
-
MD5
f2bbdfc4082e93fff71208388fabfbb6
-
SHA1
2da7d3c2a084043ecc4b416720df05b88a3d38d2
-
SHA256
e15d71fcb1e72a0b1b45aafbfc4c523fc8f65008a974a7d1d48e7b730c71070e
-
SHA512
1de4b9927adf7a9cf81edb804be7e803cbec6642f439bab208ac3dc3aec4d4120d392d7ebbecfbcb4862415e72c1d970442a6d898c497a99e44021ea8944922b
-
SSDEEP
1536:GNyps2ryqYK9rLNcGGQU9S6v3y39xi68b86SNjGzpiyaKmjUEdAiES0HA:xps9qFLOhD30Y68daP4uAVH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f2bbdfc4082e93fff71208388fabfbb6_JaffaCakes118
Files
-
f2bbdfc4082e93fff71208388fabfbb6_JaffaCakes118.exe windows:4 windows x86 arch:x86
ca5a996ce774ecb57adaa8da80aa7c0f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHDeleteKeyA
SHEnumValueA
PathGetCharTypeA
SHStrDupA
PathIsDirectoryA
SHDeleteValueA
SHQueryInfoKeyA
SHGetValueA
SHSetValueA
PathFileExistsA
oleaut32
SysFreeString
user32
GetKeyboardLayout
ReleaseCapture
GetWindowTextA
InsertMenuA
GetClassInfoA
GetWindowLongW
CharToOemA
GetSystemMenu
SetScrollRange
SetCursor
GetCursorPos
RemovePropA
SetMenu
LoadIconA
TranslateMessage
PostMessageA
CharLowerA
GetClipboardData
PtInRect
GetCursor
OpenClipboard
DefFrameProcA
DestroyWindow
DrawFrameControl
GetWindowRect
GetDesktopWindow
SetMenuItemInfoA
GetMenuState
GetMenuItemID
MessageBeep
InflateRect
RegisterClassA
BeginPaint
SetFocus
DrawEdge
MapVirtualKeyA
RemoveMenu
GetScrollInfo
GetClassLongA
UpdateWindow
IsWindowVisible
RegisterClipboardFormatA
GetMenuItemCount
ClientToScreen
EndPaint
SetPropA
SetWindowPlacement
SetParent
CreateMenu
SetClassLongA
ScrollWindow
CharLowerBuffA
CharNextW
SetActiveWindow
GetWindowThreadProcessId
GetSysColorBrush
GetMenuItemInfoA
GetScrollPos
EnumWindows
LoadKeyboardLayoutA
DefMDIChildProcA
SetWindowLongA
IsZoomed
OffsetRect
GetWindowPlacement
IsDialogMessageW
GetPropA
GetMessagePos
SetScrollInfo
GetKeyNameTextA
SetClipboardData
GetDCEx
GetWindowDC
GetKeyboardState
GetClassNameA
DrawIconEx
GetSysColor
DrawAnimatedRects
UnregisterClassA
EnableWindow
GetScrollRange
SendMessageW
ReleaseDC
SetScrollPos
PeekMessageA
GetDC
MessageBoxA
RedrawWindow
TrackPopupMenu
MsgWaitForMultipleObjects
DestroyCursor
CharNextA
CreateWindowExA
GetForegroundWindow
TranslateMDISysAccel
GetMenuStringA
CreateIcon
KillTimer
DestroyIcon
IsIconic
EqualRect
EnableScrollBar
EnumChildWindows
PostQuitMessage
GetFocus
CreatePopupMenu
DrawMenuBar
RegisterWindowMessageA
GetCapture
CallNextHookEx
ScreenToClient
DefWindowProcA
CharUpperBuffA
GetSubMenu
LoadCursorA
AdjustWindowRectEx
GetMenu
DeleteMenu
GetKeyboardLayoutNameA
GetKeyboardType
MapWindowPoints
GetClientRect
ShowWindow
OemToCharA
DrawIcon
GetSystemMetrics
IsRectEmpty
wsprintfA
CloseClipboard
SetRect
IsWindow
SetWindowPos
UnhookWindowsHookEx
SendMessageA
GetTopWindow
IsWindowUnicode
FindWindowA
IsWindowEnabled
SetCapture
EmptyClipboard
MoveWindow
ChildWindowFromPoint
GetKeyState
SystemParametersInfoA
ShowOwnedPopups
SetForegroundWindow
GetWindowLongA
LoadBitmapA
CheckMenuItem
IsDialogMessageA
IsChild
ActivateKeyboardLayout
InvalidateRect
WindowFromPoint
GetIconInfo
EnumThreadWindows
GetActiveWindow
PeekMessageW
DispatchMessageW
DrawTextA
WaitMessage
GetParent
EnableMenuItem
GetKeyboardLayoutList
FrameRect
FillRect
CallWindowProcA
GetLastActivePopup
GetWindow
SetTimer
kernel32
ResetEvent
CloseHandle
MoveFileExA
GetDateFormatA
CreateEventA
GetCurrentProcessId
GetStringTypeW
SizeofResource
LoadLibraryA
FormatMessageA
SetFilePointer
FreeLibrary
WaitForSingleObject
GetCPInfo
ExitProcess
EnumCalendarInfoA
GetThreadLocale
GetDiskFreeSpaceA
GetStringTypeA
FindClose
LoadLibraryExA
GlobalAlloc
GetStdHandle
MulDiv
GetFileSize
GetSystemDefaultLangID
GetFileType
WideCharToMultiByte
GetACP
LockResource
CreateFileA
GetModuleHandleA
ReadFile
MoveFileA
GetUserDefaultLCID
HeapFree
LocalReAlloc
FindResourceA
GetProcessHeap
SetLastError
GetStartupInfoA
RaiseException
CreateThread
ExitThread
GetVersion
LocalAlloc
GetFullPathNameA
InitializeCriticalSection
CompareStringA
lstrcatA
FreeResource
VirtualAlloc
VirtualFree
DeleteCriticalSection
SetErrorMode
VirtualAllocEx
GetFileAttributesA
lstrcmpiA
FindFirstFileA
GetCommandLineA
GlobalAddAtomA
GetModuleFileNameA
GetEnvironmentStrings
GetOEMCP
GetCurrentProcess
EnterCriticalSection
SetThreadLocale
SetEvent
GetProcAddress
GetLocaleInfoA
GetVersionExA
GetCurrentThread
VirtualQuery
Sleep
GlobalDeleteAtom
LoadResource
GlobalFindAtomA
GetLastError
GetLocalTime
SetHandleCount
lstrlenA
lstrcpyA
WriteFile
SetEndOfFile
lstrcmpA
GetCurrentThreadId
msvcrt
cos
memmove
rand
exp
memcpy
calloc
Sections
CODE Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.init Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ