Static task
static1
Behavioral task
behavioral1
Sample
f4e45d6fcdb296e604831c7cd8ca06ca_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f4e45d6fcdb296e604831c7cd8ca06ca_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f4e45d6fcdb296e604831c7cd8ca06ca_JaffaCakes118
-
Size
904KB
-
MD5
f4e45d6fcdb296e604831c7cd8ca06ca
-
SHA1
8af6e21120347285bfc997a39366afd3711f5156
-
SHA256
06e7e6c8552e077500936f5131827ac641fb19c559a8d32f1da7c3ac30328592
-
SHA512
051d51ea66d0cc3b0664f8ad1f677198f553cd06220f2b894398fba4439c4d682c858cec86462914230771d8a57d29da75f62304e7b0cf2ced0ccd9008673a24
-
SSDEEP
24576:7RFDmH3VwqA888888888888888888888288888x888v888+88F88W88v88Q8e8HJ:2wqA888888888888888888888288888j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f4e45d6fcdb296e604831c7cd8ca06ca_JaffaCakes118
Files
-
f4e45d6fcdb296e604831c7cd8ca06ca_JaffaCakes118.exe windows:4 windows x86 arch:x86
74f49bbc96b9778e3e15c256504f65af
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
HeapFree
HeapAlloc
RaiseException
GetACP
GetTimeZoneInformation
SetStdHandle
GetFileType
HeapReAlloc
HeapSize
MulDiv
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetDriveTypeA
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetModuleHandleA
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
EnterCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
LocalFree
GetFullPathNameA
GetProcAddress
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GetCurrentProcess
DuplicateHandle
GetFileTime
GetFileAttributesA
lstrcpynA
FindNextFileA
lstrcpyA
FindFirstFileA
GetLastError
SetLastError
FindClose
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
WaitForSingleObject
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GetModuleFileNameA
WinExec
GlobalLock
GlobalUnlock
GlobalAlloc
GlobalFree
GetVolumeInformationA
Sleep
GetCurrentDirectoryA
FindResourceA
LoadResource
LockResource
GetTempPathA
DeleteFileA
SizeofResource
WriteFile
LoadLibraryA
FreeLibrary
CreateFileA
CloseHandle
GetFileSize
ReadFile
user32
DrawTextA
GrayStringA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
LoadStringA
DestroyMenu
SetWindowTextA
IsDialogMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
AdjustWindowRectEx
CopyRect
TabbedTextOutA
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgCtrlID
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindowTextA
CharUpperA
wsprintfA
SetFocus
UnhookWindowsHookEx
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GetTopWindow
ShowWindow
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
EnableWindow
LoadIconA
SetForegroundWindow
UnregisterClassA
gdi32
GetDeviceCaps
PtVisible
TextOutA
ExtTextOutA
Escape
DeleteObject
RectVisible
CreateBitmap
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
shell32
ShellExecuteA
comctl32
ord17
Sections
.text Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 744KB - Virtual size: 743KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ