Static task
static1
Behavioral task
behavioral1
Sample
f7ce813d555242e788c8c7e7980762eb_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f7ce813d555242e788c8c7e7980762eb_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f7ce813d555242e788c8c7e7980762eb_JaffaCakes118
-
Size
179KB
-
MD5
f7ce813d555242e788c8c7e7980762eb
-
SHA1
ebdb35396cc32a193f1c252d5710fd041b7545ae
-
SHA256
083a618752704fee9e0f37b2765568532fc569cc8d98f967da498ea2c37fb69c
-
SHA512
7f5ac3380d4a228f5139c9d7dbe766b0459356ce14b297d53a6ecda7fb1b0ac1084af77bd73b0a47d86941d95dddf612f44add0017cd85c2fd733dfd571c893a
-
SSDEEP
3072:uxSAcTY9nPaUyS0K6BGYBO8oGe1R81CHzSIQ0:eJibo8kY1CHrJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f7ce813d555242e788c8c7e7980762eb_JaffaCakes118
Files
-
f7ce813d555242e788c8c7e7980762eb_JaffaCakes118.exe windows:4 windows x86 arch:x86
23af9b1c585329afb0fa8a41b9da9c90
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetFileTitleW
advapi32
RegEnumKeyExW
RegQueryValueW
RegEnumKeyW
RegOpenKeyW
RegOpenKeyExW
RegDeleteKeyW
RegQueryInfoKeyW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
RegQueryValueExW
oledlg
OleUIBusyW
kernel32
LoadLibraryW
GetModuleFileNameW
CreateDirectoryW
GetLocaleInfoW
GetCalendarInfoA
MoveFileW
EnumResourceLanguagesW
MultiByteToWideChar
ReleaseMutex
FindFirstFileW
ConvertDefaultLocale
SystemTimeToFileTime
VirtualFree
InitializeCriticalSection
GetACP
GetSystemDefaultLangID
SetThreadContext
LocalFileTimeToFileTime
GetFileAttributesW
RaiseException
FindResourceW
CreateFileW
LockResource
SetFilePointer
GetCurrentDirectoryW
GetVersion
CloseHandle
EnumResourceNamesA
GetLocaleInfoA
WaitForSingleObject
GetCurrentProcessId
ReadFile
WideCharToMultiByte
FindClose
FreeLibrary
ExitProcess
lstrcmpiA
InterlockedDecrement
LoadResource
InterlockedExchange
GetProcAddress
WriteFile
SetFileTime
GetThreadLocale
RemoveDirectoryW
CreateMutexW
GetModuleHandleW
GetVersionExW
DeleteCriticalSection
DeleteFileW
SizeofResource
FindNextFileW
lstrcpyW
lstrcmpA
ole32
CoTaskMemFree
CoCreateInstance
OleUninitialize
CoUninitialize
OleInitialize
CoInitialize
OleFlushClipboard
CoFreeUnusedLibraries
CoGetClassObject
CLSIDFromProgID
CoRevokeClassObject
CreateILockBytesOnHGlobal
CoTaskMemAlloc
OleIsCurrentClipboard
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CoRegisterMessageFilter
CLSIDFromString
gdi32
ScaleViewportExtEx
SetWindowExtEx
GetObjectW
SetMapMode
GetTextColor
OffsetViewportOrgEx
DeleteDC
GetViewportExtEx
GetWindowExtEx
PtVisible
SetBkColor
SaveDC
RectVisible
SetViewportExtEx
GetClipBox
RestoreDC
SetViewportOrgEx
GetBkColor
TextOutW
ScaleWindowExtEx
GetStockObject
DeleteObject
Escape
ExtTextOutW
ExtSelectClipRgn
SetTextColor
GetRgnBox
GetMapMode
CreateBitmap
GetDeviceCaps
SelectObject
CreateRectRgnIndirect
user32
GetNextDlgTabItem
DefWindowProcW
IntersectRect
RemovePropW
CallWindowProcW
OffsetRect
UpdateWindow
GetClientRect
SendDlgItemMessageA
InvalidateRect
IsIconic
GetMenu
CreateWindowExW
AdjustWindowRectEx
MessageBeep
IsRectEmpty
GetTopWindow
EqualRect
GetMessageTime
RegisterClassW
RegisterWindowMessageW
LoadIconW
SetForegroundWindow
GetMessagePos
GetPropW
GetClassInfoW
GetNextDlgGroupItem
WinHelpW
GetWindowPlacement
IsChild
InvalidateRgn
GetClassInfoExW
CopyAcceleratorTableW
SetActiveWindow
IsWindow
CharUpperW
SetPropW
GetForegroundWindow
MapWindowPoints
SetRect
GetClassLongW
CharNextW
DestroyMenu
shlwapi
PathFileExistsW
PathStripToRootW
PathIsUNCW
PathFindExtensionW
PathFindFileNameW
PathRemoveFileSpecW
PathAppendW
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
shell32
SHCreateDirectoryExW
SHGetSpecialFolderPathW
Sections
.text Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ