Static task
static1
Behavioral task
behavioral1
Sample
ffdba80419057a9f80f039bacf1b2f5b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ffdba80419057a9f80f039bacf1b2f5b_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ffdba80419057a9f80f039bacf1b2f5b_JaffaCakes118
-
Size
94KB
-
MD5
ffdba80419057a9f80f039bacf1b2f5b
-
SHA1
c8d3aaf5cf7ea8f2ecf8bc8681dd2b1b70df5d67
-
SHA256
5fc8d324e17c8ed66cf518407877524a26dd99c608cadb831f8f292f68316a7a
-
SHA512
a7d17ccf0cc0d6fa12f1b18ad5aed5dddce7db7d85d5b35cfcd79e5c618695440842986a69c2d79e904b63edce510dd531222ead0c8e23be26bf92eb26987276
-
SSDEEP
1536:EJ+IdI6U8n87G1Dt//Rvj420WdawK0JnaC5k1AB7njn+rG+uLaVd2AYhscqTG:Ap7I0Rj10k60JnxGC7jn+6+LQAYhsHS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ffdba80419057a9f80f039bacf1b2f5b_JaffaCakes118
Files
-
ffdba80419057a9f80f039bacf1b2f5b_JaffaCakes118.exe windows:4 windows x86 arch:x86
ace1d2a6a0bb65b9f15dfcaf51a5f522
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
avifil32
AVIFileInfoA
gdi32
DeleteObject
GetTextExtentPointA
ExcludeClipRect
oleaut32
SafeArrayCreate
SysAllocStringLen
SysReAllocStringLen
wsock32
WSAStartup
user32
ActivateKeyboardLayout
BeginPaint
AppendMenuW
CharPrevW
ChildWindowFromPoint
ClientToScreen
CreateDialogParamA
CreateMenu
CopyRect
CreateWindowExA
DestroyCursor
DdeInitializeA
DrawTextA
CreateCaret
CreateDialogIndirectParamW
DdeFreeStringHandle
DdeDisconnect
DdeCreateStringHandleA
DestroyIcon
GetMenuStringA
DispatchMessageW
DrawStateA
GetClassNameW
DrawMenuBar
GetClientRect
DialogBoxParamA
GetCapture
EnableMenuItem
GetDCEx
EnableScrollBar
EnumWindows
GetSubMenu
GetQueueStatus
LoadImageW
GetMenuState
FrameRect
GetCursorPos
GetSysColorBrush
GetMessageTime
GetLastActivePopup
GetWindowRect
KillTimer
MapWindowPoints
GetMessagePos
OemToCharA
GetWindowThreadProcessId
GetWindow
MessageBoxA
GetClassNameA
OffsetRect
IsClipboardFormatAvailable
InsertMenuA
LoadMenuW
GetScrollInfo
LockWindowUpdate
GetUpdateRect
IsWindowVisible
SetDlgItemTextW
PostMessageW
SetClipboardData
MessageBoxW
PeekMessageW
MsgWaitForMultipleObjects
LoadKeyboardLayoutA
SetActiveWindow
SetMenu
SetWindowLongA
IsDlgButtonChecked
PostQuitMessage
IsIconic
SetDlgItemTextA
TranslateMDISysAccel
SubtractRect
InvalidateRgn
ReleaseDC
RegisterClassExA
SetScrollInfo
SetTimer
TranslateMessage
LoadIconW
ShowScrollBar
PeekMessageA
SetCapture
SystemParametersInfoA
SetMenuItemBitmaps
SetCaretPos
UnionRect
ShowCaret
SetFocus
SendDlgItemMessageA
ToAscii
TranslateAcceleratorA
UnregisterClassA
wsprintfA
SetWindowTextA
RegisterClassA
SendMessageTimeoutA
ShowWindow
kernel32
CreateDirectoryA
FileTimeToDosDateTime
CreateMutexA
AddAtomA
FindResourceExA
CloseHandle
EnumCalendarInfoA
DeleteFileW
CreateDirectoryW
DeviceIoControl
FindFirstFileA
FindNextFileW
GetCommandLineA
FindResourceA
FreeLibrary
GetFileSize
GetCurrentDirectoryW
GetConsoleMode
GetCPInfo
GetConsoleCP
GetEnvironmentStrings
ExitThread
GetCurrentProcess
GetDateFormatA
GetLogicalDrives
GetLocaleInfoW
GetConsoleOutputCP
GetFileAttributesA
GetTempPathW
GetTempFileNameW
GetProcessTimes
GetLogicalDriveStringsW
GetACP
GetProcessHeap
GetPriorityClass
GetShortPathNameW
GlobalDeleteAtom
GetWindowsDirectoryW
GetFileTime
GetModuleFileNameW
GetStartupInfoA
HeapFree
InterlockedIncrement
GetTempPathA
HeapCreate
GetPrivateProfileStringA
IsValidLocale
OpenEventW
IsValidCodePage
GetTimeFormatA
GlobalMemoryStatus
GetStringTypeExW
PulseEvent
GetThreadPriority
HeapReAlloc
HeapDestroy
lstrcatA
LeaveCriticalSection
GetTickCount
InitializeCriticalSection
HeapSize
GlobalSize
GetVolumeInformationA
SetErrorMode
LCMapStringA
OutputDebugStringA
SetProcessWorkingSetSize
RemoveDirectoryA
MoveFileA
LoadResource
WritePrivateProfileStringW
lstrlenW
WinExec
QueryPerformanceFrequency
OpenFileMappingW
MultiByteToWideChar
TerminateThread
ResumeThread
SetUnhandledExceptionFilter
lstrcmpA
SetLastError
LockResource
SetFileAttributesA
lstrlenA
SetThreadLocale
UnmapViewOfFile
SearchPathA
Sleep
WritePrivateProfileSectionW
MoveFileExW
SizeofResource
TlsAlloc
WideCharToMultiByte
SetFilePointer
SetFileTime
SetCurrentDirectoryW
Sections
CODE Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 8KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE