Static task
static1
Behavioral task
behavioral1
Sample
f8c0cdda4d68d1730a4edc7a19ff6bff_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f8c0cdda4d68d1730a4edc7a19ff6bff_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f8c0cdda4d68d1730a4edc7a19ff6bff_JaffaCakes118
-
Size
188KB
-
MD5
f8c0cdda4d68d1730a4edc7a19ff6bff
-
SHA1
a2defb89c78f66dcd4ddc00b0e8b1c06e092d94b
-
SHA256
9b656a95f9b10f71447b383f1cd3e982198e784acc9548b454ab78b049e46f30
-
SHA512
792e5040b1ab1f3b15b513d766b76b17f8b839d44b61e265c2d348581a09e9639c99285179f36d2cc1e8b276b43c3be992722f04c6864ce18889ab0b8c67e93e
-
SSDEEP
3072:EFwpFCI/u0rKmCcZdiORAqrdmV9fweQiuJdxVlHJGbD:cOgI/drgudiOaNTweQvZJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f8c0cdda4d68d1730a4edc7a19ff6bff_JaffaCakes118
Files
-
f8c0cdda4d68d1730a4edc7a19ff6bff_JaffaCakes118.exe windows:4 windows x86 arch:x86
bc08b522e80da29f3ac82821ce4ac87d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
ExitProcess
HeapReAlloc
HeapSize
GetStartupInfoA
GetCommandLineA
TerminateProcess
SetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetDriveTypeA
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
GetOEMCP
GetCPInfo
SetErrorMode
GetFileTime
GetFileAttributesA
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GlobalFlags
GetCurrentDirectoryA
lstrcatA
WritePrivateProfileStringA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
InterlockedIncrement
CreateFileA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LeaveCriticalSection
EnterCriticalSection
LocalAlloc
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
WaitForSingleObject
GlobalAddAtomA
GetCurrentThread
GetCurrentThreadId
FreeLibrary
GlobalDeleteAtom
lstrcmpA
GetModuleHandleA
GetProcAddress
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
LoadLibraryA
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
lstrcpynA
LocalFree
DeleteFileA
CopyFileA
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
GetPrivateProfileStringA
GetModuleFileNameA
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
Sleep
CreateProcessA
InterlockedDecrement
FindResourceA
LoadResource
LockResource
SizeofResource
CompareStringW
CompareStringA
lstrlenA
lstrlenW
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetCurrentProcessId
InterlockedExchange
user32
DestroyMenu
RegisterWindowMessageA
WinHelpA
CreateWindowExA
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
CopyRect
ShowWindow
GetDlgItem
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
CharUpperA
UnregisterClassA
SetWindowTextA
SetWindowLongA
GetWindowLongA
SetWindowPos
ReleaseDC
GetDC
MessageBoxA
GetSubMenu
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetWindowTextA
GetClassNameA
GetCapture
ClientToScreen
UnhookWindowsHookEx
LoadCursorA
GetSysColor
GetSysColorBrush
wsprintfA
GetSystemMetrics
SetMenuItemBitmaps
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
GetWindowPlacement
GetMenuItemCount
GetMenuItemID
GetMenuState
PostMessageA
PostQuitMessage
SetCursor
SendMessageA
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetParent
ValidateRect
GetCursorPos
PeekMessageA
GetKeyState
IsWindowVisible
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
gdi32
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
GetDeviceCaps
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
CreateBitmap
SetViewportOrgEx
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
GetUserNameA
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegDeleteValueA
RegCreateKeyExA
shell32
ShellExecuteA
comctl32
ord17
shlwapi
PathFindFileNameA
UrlUnescapeA
PathStripToRootA
PathFileExistsA
PathFindExtensionA
PathIsUNCA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
VariantClear
VariantChangeType
SysAllocString
VariantInit
GetErrorInfo
SysFreeString
wininet
InternetOpenUrlA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetQueryDataAvailable
Sections
.text Size: 124KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ