Static task
static1
Behavioral task
behavioral1
Sample
fcc633890b047560677206487ebb2b4d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fcc633890b047560677206487ebb2b4d_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fcc633890b047560677206487ebb2b4d_JaffaCakes118
-
Size
167KB
-
MD5
fcc633890b047560677206487ebb2b4d
-
SHA1
a26874d300f8a8c340b79ef28645dac97f30e577
-
SHA256
d475345232bbb2ba721a85b6637140e103ed253a18aea46495dd995e9a423723
-
SHA512
f22ba446b742319568396ffc5b1123a711353b61dbc6cc35a738d55db7ce7c0e24ccf4988d37d2a61e2617b0cca2427ecbd965bb0649df97994f710001abed95
-
SSDEEP
3072:XS1xruW4OrY2PRNtCXUaAq/zO/5tokXDIKE8I82vi:VW4OrY2POOBtN1I8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fcc633890b047560677206487ebb2b4d_JaffaCakes118
Files
-
fcc633890b047560677206487ebb2b4d_JaffaCakes118.exe windows:4 windows x86 arch:x86
4cc077b240539f6f9569ae4a009f1fe9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegLoadKeyA
user32
GetWindowLongA
GetClassNameA
FillRect
DefMDIChildProcA
GetCapture
SetForegroundWindow
GetSubMenu
DispatchMessageA
DrawIcon
GetDCEx
SetClassLongA
GetDesktopWindow
PostQuitMessage
SetPropA
IsWindow
SetScrollRange
EnableWindow
IsWindowVisible
RegisterWindowMessageA
OpenClipboard
DrawAnimatedRects
GetLastActivePopup
GetIconInfo
MessageBoxA
LoadBitmapA
GetSysColorBrush
OemToCharA
SendMessageW
EnableMenuItem
SetMenuItemInfoA
SetWindowPlacement
GetClassInfoA
GetSystemMetrics
GetWindowPlacement
InsertMenuA
RedrawWindow
CharToOemA
GetWindowDC
EmptyClipboard
TranslateMDISysAccel
UpdateWindow
GetScrollPos
CreatePopupMenu
GetTopWindow
PeekMessageW
RegisterClassA
GetClassLongA
DrawIconEx
RegisterClipboardFormatA
GetMenuItemCount
InvalidateRect
OffsetRect
EnumWindows
EqualRect
DestroyCursor
GetClipboardData
GetSysColor
MoveWindow
MsgWaitForMultipleObjects
LoadCursorA
GetMenuItemInfoA
MessageBeep
IsDialogMessageA
UnhookWindowsHookEx
CharLowerA
ScrollWindow
GetWindowRect
GetKeyNameTextA
IsDialogMessageW
GetMenu
GetDC
LoadIconA
SetScrollInfo
GetScrollRange
SetParent
SetFocus
SetWindowLongW
DestroyIcon
GetCursor
SetClipboardData
InsertMenuItemA
IsZoomed
CallNextHookEx
PostMessageA
CharLowerBuffA
AdjustWindowRectEx
DestroyWindow
SystemParametersInfoA
KillTimer
CharNextA
PeekMessageA
ShowScrollBar
WindowFromPoint
SetWindowPos
ReleaseDC
GetWindowLongW
CreateIcon
ClientToScreen
DispatchMessageW
SetMenu
IsWindowUnicode
IsWindowEnabled
RemovePropA
SetScrollPos
DrawEdge
ShowWindow
GetWindowThreadProcessId
CheckMenuItem
FindWindowA
SetWindowsHookExA
LoadKeyboardLayoutA
SetRect
SetWindowLongA
GetKeyState
IsChild
BeginPaint
DestroyMenu
RemoveMenu
MapWindowPoints
GetWindow
PtInRect
IntersectRect
LoadStringA
WaitMessage
SetCursor
GetMenuStringA
DrawFrameControl
SetTimer
CreateWindowExA
GetForegroundWindow
GetKeyboardState
DefFrameProcA
GetWindowTextA
GetKeyboardLayoutNameA
GetScrollInfo
ScreenToClient
SetWindowTextA
GetSystemMenu
UnregisterClassA
CharNextW
SetActiveWindow
MapVirtualKeyA
GetClientRect
CreateMenu
GetPropA
GetActiveWindow
GetKeyboardLayoutList
GetParent
EnumThreadWindows
SendMessageA
SetCapture
FrameRect
ActivateKeyboardLayout
EnableScrollBar
ReleaseCapture
EndPaint
DrawTextA
DrawMenuBar
DeleteMenu
IsIconic
TranslateMessage
CloseClipboard
GetMenuState
ShowOwnedPopups
GetKeyboardLayout
GetDlgItem
GetMenuItemID
DefWindowProcA
GetFocus
GetKeyboardType
EnumChildWindows
wsprintfA
CallWindowProcA
GetMessagePos
CharUpperBuffA
ole32
CreateStreamOnHGlobal
CoUnmarshalInterface
StringFromIID
CoCreateFreeThreadedMarshaler
msvcrt
cos
memcpy
memmove
kernel32
CloseHandle
GetLocalTime
LocalAlloc
FindFirstFileA
HeapAlloc
GetFullPathNameA
GetModuleHandleA
LockResource
SetErrorMode
GetStringTypeW
InitializeCriticalSection
SetFilePointer
FreeLibrary
GetACP
LocalFree
RaiseException
GetFileSize
DeleteFileA
ResetEvent
GetSystemDefaultLangID
GetDateFormatA
FormatMessageA
GetCurrentProcessId
GlobalFindAtomA
ExitThread
lstrcmpiA
DeleteCriticalSection
lstrcatA
EnterCriticalSection
MoveFileExA
HeapFree
MulDiv
GetCurrentProcess
GetThreadLocale
GetUserDefaultLCID
GetStringTypeA
GetFileType
WriteFile
lstrcmpA
SetHandleCount
FreeResource
LocalReAlloc
GetVersionExA
GetLocaleInfoA
ReadFile
SetEndOfFile
GetCurrentThreadId
HeapDestroy
GlobalDeleteAtom
WaitForSingleObject
GetProcAddress
CreateFileA
GetStartupInfoA
GetVersion
CreateThread
GetProcessHeap
CreateEventA
GetOEMCP
VirtualFree
FindResourceA
GetLastError
SetThreadLocale
GetFileAttributesA
lstrlenA
GetDiskFreeSpaceA
LoadResource
GetEnvironmentStrings
GetCPInfo
SetLastError
GlobalAddAtomA
GetCurrentThread
MoveFileA
ExitProcess
LoadLibraryA
VirtualAlloc
EnumCalendarInfoA
Sleep
WideCharToMultiByte
CompareStringA
SetEvent
VirtualQuery
SizeofResource
lstrcpynA
GlobalAlloc
GetCommandLineA
lstrcpyA
FindClose
GetTickCount
LoadLibraryExA
Sections
.text Size: 153KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 1KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 224B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE