Static task
static1
Behavioral task
behavioral1
Sample
ffa3221dd61c94990f2d616681695701_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ffa3221dd61c94990f2d616681695701_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
ffa3221dd61c94990f2d616681695701_JaffaCakes118
-
Size
455KB
-
MD5
ffa3221dd61c94990f2d616681695701
-
SHA1
181d2d62111ed652de610803befaea52c86268ba
-
SHA256
42f8810a9264bbae39105d18282a959a0338af6b0eeb048838b77004e1a9de8f
-
SHA512
659ec0df5a8667229b2a947ebd5957df44103a1abde8d42de3d82b2cae36139361b8a8a302a8e92593fbce428df21bd34a2b8a62d47f006a732c3942eb2da3aa
-
SSDEEP
6144:abO+FJ3xaY0sIihpW2rLFwvyt4JB5eIgQeZ:abOX/sIihpW2rKymJa/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ffa3221dd61c94990f2d616681695701_JaffaCakes118
Files
-
ffa3221dd61c94990f2d616681695701_JaffaCakes118.exe windows:4 windows x86 arch:x86
b2e1d1396e0411fed9cab6d3893e4d87
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
PlaySoundA
kernel32
GetTimeZoneInformation
CreateThread
ExitThread
HeapAlloc
GetCommandLineA
ExitProcess
GetSystemTime
GetLocalTime
GetCPInfo
GetACP
HeapFree
GetOEMCP
HeapReAlloc
HeapSize
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
TerminateProcess
GetStdHandle
GetModuleHandleA
GetStartupInfoA
LoadLibraryA
MoveFileA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
GetLocaleInfoA
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetStdHandle
GetLocaleInfoW
MultiByteToWideChar
RaiseException
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
lstrlenA
RemoveDirectoryA
RtlUnwind
GlobalAddAtomA
SizeofResource
GetCurrentDirectoryA
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
GlobalFlags
GetProcessVersion
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalFree
LockResource
FindResourceA
LoadResource
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetCurrentThread
SetFileAttributesA
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileTime
GetFileSize
GetFileAttributesA
GetModuleFileNameA
lstrcmpiA
GetFullPathNameA
GetVolumeInformationA
lstrcpyA
GetProcAddress
HeapDestroy
FreeLibrary
WritePrivateProfileStringA
GetPrivateProfileStringA
DeleteFileA
SetEndOfFile
HeapCreate
UnlockFile
CreateEventA
GetPrivateProfileIntA
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
lstrcpynA
FindNextFileA
FindFirstFileA
GetLastError
SetLastError
FindClose
GlobalLock
GlobalUnlock
MulDiv
FileTimeToLocalFileTime
FileTimeToSystemTime
VirtualFree
VirtualAlloc
GetFileType
GetCurrentThreadId
GetVersionExA
GetDriveTypeA
GetWindowsDirectoryA
LocalFree
LocalAlloc
CopyFileA
GetProfileStringA
ResumeThread
SuspendThread
CloseHandle
WaitForSingleObject
SetEvent
SetThreadPriority
user32
GetMenuItemID
GetSubMenu
GetMenuItemCount
RegisterClassA
GetClassInfoA
WinHelpA
IsChild
GetTopWindow
SetScrollPos
GetScrollPos
SetScrollRange
ShowScrollBar
SetScrollInfo
ScrollWindow
EndDeferWindowPos
CopyRect
BeginDeferWindowPos
DeferWindowPos
EqualRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
SystemParametersInfoA
UpdateWindow
LoadStringA
DestroyMenu
GetSysColorBrush
GetClassNameA
GetMenu
IntersectRect
InflateRect
SetRectEmpty
LoadAcceleratorsA
TranslateAcceleratorA
LoadMenuA
SetMenu
ReuseDDElParam
UnpackDDElParam
InvalidateRect
BringWindowToTop
FindWindowA
OffsetRect
GetDesktopWindow
ReleaseCapture
LoadCursorA
GetCapture
GetLastActivePopup
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
PtInRect
DefWindowProcA
WindowFromPoint
GrayStringA
DrawTextA
TabbedTextOutA
GetWindowDC
GetDC
ShowWindow
SetWindowPos
MoveWindow
SetWindowLongA
GetWindowTextA
SetWindowTextA
GetWindowLongA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
UnhookWindowsHookEx
wsprintfA
MessageBoxA
SetCursor
ShowOwnedPopups
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetParent
GetNextDlgTabItem
IsWindowVisible
EnableWindow
GetWindowRect
ScreenToClient
LockWindowUpdate
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
CreateWindowExA
GetSystemMenu
AppendMenuA
LoadIconA
SendMessageA
GetClassLongA
SetPropA
GetForegroundWindow
SetForegroundWindow
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetWindow
RegisterWindowMessageA
ClientToScreen
RedrawWindow
EndPaint
BeginPaint
PostQuitMessage
PostMessageA
CharUpperA
ExitWindowsEx
IsWindowEnabled
SetFocus
GetWindowTextLengthA
GetDlgCtrlID
ReleaseDC
DrawFocusRect
DefDlgProcA
UnregisterClassA
ShowCaret
IsWindowUnicode
CharNextA
HideCaret
ExcludeUpdateRgn
gdi32
CreateBitmap
SaveDC
RestoreDC
SelectObject
GetStockObject
SetBkColor
SetBkMode
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
CreateCompatibleDC
ScaleWindowExtEx
GetClipBox
IntersectClipRect
DeleteObject
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
PatBlt
GetObjectA
GetTextExtentPointA
BitBlt
DeleteDC
CreateDIBitmap
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegQueryValueExA
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegEnumValueA
RegDeleteValueA
RegOpenKeyExA
RegEnumKeyExA
shell32
DragQueryFileA
DragFinish
comctl32
ImageList_Destroy
ord17
Sections
.text Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 86KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pcedgja Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
moelqrg Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ravjhgx Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pvpijsw Size: 57KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE