Static task
static1
Behavioral task
behavioral1
Sample
02bca01c3404f092e688449ca8ef797b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02bca01c3404f092e688449ca8ef797b_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
02bca01c3404f092e688449ca8ef797b_JaffaCakes118
-
Size
176KB
-
MD5
02bca01c3404f092e688449ca8ef797b
-
SHA1
a6aac2cc2d318599543e5a92be1778ed988825fe
-
SHA256
ef8219e411ef7c74875a0050453624958cf74c2b08dd227003816cb9b25e0283
-
SHA512
db1286b8e52bc80865ed27e464dd22187b8b061803e4d3d1369261ca20a783025c08f4859dd76a540923096aabe94809184576cc3edc37233dec260228ad9af2
-
SSDEEP
1536:151A5sSq46RzRQVvUME/5F3H8QTAP0x0R4sbA5uXDg8GtbjfzRfvZdgE6EZm6N5a:lVlzKw8usbhkZ5fzPdZ6x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02bca01c3404f092e688449ca8ef797b_JaffaCakes118
Files
-
02bca01c3404f092e688449ca8ef797b_JaffaCakes118.exe windows:4 windows x86 arch:x86
6a2d5ffceb19c120d948138fdff1c323
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
wsprintfW
PostMessageA
MessageBoxW
CharNextA
GetClassInfoA
SendDlgItemMessageW
GetSystemMenu
AppendMenuA
AppendMenuW
ExitWindowsEx
GetKeyState
EnumChildWindows
GetDlgCtrlID
GetClassNameA
LoadCursorA
SetCursor
DefDlgProcA
UnregisterClassA
LoadIconA
RegisterClassA
LoadBitmapA
SetWindowLongA
CallWindowProcA
GetWindowLongA
GetWindowTextW
GetSystemMetrics
GetWindowInfo
GetDC
MessageBeep
GetClientRect
SetWindowPos
GetWindowTextA
DestroyWindow
GetWindowRect
CreateDialogParamW
MapDialogRect
MoveWindow
BeginPaint
FillRect
EndPaint
ReleaseDC
GetWindowTextLengthA
SetDlgItemTextA
SetWindowTextA
ShowWindow
SetWindowTextW
SetFocus
EndDialog
DialogBoxParamW
EnableWindow
EnumWindows
SendMessageA
SendMessageW
SendDlgItemMessageA
GetParent
GetDlgItem
InvalidateRect
SystemParametersInfoW
MessageBoxA
kernel32
GetSystemDirectoryA
RtlUnwind
InterlockedDecrement
InterlockedIncrement
HeapDestroy
IsDebuggerPresent
GetCurrentProcessId
FormatMessageW
VirtualQuery
ReleaseMutex
CreateMutexA
SetFileTime
GetFileTime
FlushFileBuffers
GetFileSize
GetFileSizeEx
GetCurrentProcess
GetVersionExA
GetCurrentDirectoryA
LockResource
GetFileAttributesA
SetFilePointer
GetCurrentThreadId
UnhandledExceptionFilter
GetSystemInfo
GetFileInformationByHandle
WaitForSingleObject
GetCurrentThread
SetUnhandledExceptionFilter
SetErrorMode
FindNextFileW
CreateFileW
FindFirstFileW
GetLocaleInfoW
GetTimeZoneInformation
GetProcessHeap
SetEndOfFile
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeA
GetLocaleInfoA
GetTickCount
LoadLibraryExA
GetEnvironmentStringsW
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetConsoleMode
GetConsoleCP
SetHandleCount
PeekNamedPipe
GetFullPathNameA
HeapSize
GetStdHandle
HeapCreate
FileTimeToLocalFileTime
GetModuleHandleA
GetLastError
QueryPerformanceCounter
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetProcAddress
lstrlenA
lstrcmpiA
LocalFree
LocalAlloc
FormatMessageA
GetModuleFileNameW
GetEnvironmentStrings
CloseHandle
ReadFile
WriteFile
CreateProcessA
SetHandleInformation
CreatePipe
GetModuleFileNameA
DeleteFileA
RemoveDirectoryA
DeviceIoControl
Sleep
CreateFileA
FindClose
FindFirstFileA
CopyFileA
SetCurrentDirectoryA
GetWindowsDirectoryA
GetTempPathA
MoveFileA
LoadLibraryA
SetLastError
SetFilePointerEx
CreateDirectoryA
GetDriveTypeA
GetShortPathNameA
GetVolumeInformationA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
SetEnvironmentVariableA
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetModuleHandleW
FileTimeToSystemTime
ExitThread
ResumeThread
CreateThread
ExitProcess
GetSystemTimeAsFileTime
TerminateProcess
GetFileAttributesW
SetStdHandle
GetFileType
GetCommandLineA
GetStartupInfoA
LCMapStringA
LCMapStringW
GetCPInfo
GetStringTypeW
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
VirtualFree
HeapReAlloc
Sections
.text Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CODE Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ