Static task
static1
Behavioral task
behavioral1
Sample
63fc1ee60042d63475654f7ff67e512e_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
63fc1ee60042d63475654f7ff67e512e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
63fc1ee60042d63475654f7ff67e512e_JaffaCakes118
-
Size
846KB
-
MD5
63fc1ee60042d63475654f7ff67e512e
-
SHA1
30829727f0aec882e6bbb5ce057044a717a3f600
-
SHA256
9ca7c59367e4233cc7458b48b7011516a55a3842172eb541232f3ba7f2406f0d
-
SHA512
27850a4d9153be53410ac6e288cb218b1876906a3d6ff347de28ebe0dfd8e34622cb32ad7ed93d20fd182130c822ae7abf34920e1fef4d58676394f4a5b0e3b0
-
SSDEEP
12288:QPIFt4biVyzHDXrDh0CHGh0FcHQ7t4PP5emGq:aIF5VyXrjm6F5t4Ze3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 63fc1ee60042d63475654f7ff67e512e_JaffaCakes118
Files
-
63fc1ee60042d63475654f7ff67e512e_JaffaCakes118.exe windows:5 windows x86 arch:x86
95667768b8c8663113dc1cebf0c202fc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalReAlloc
GlobalUnlock
InterlockedExchange
LoadLibraryA
LocalAlloc
LocalFree
LocalLock
LocalUnlock
MulDiv
MultiByteToWideChar
OpenFile
QueryPerformanceCounter
RaiseException
SetFileAttributesA
SetUnhandledExceptionFilter
GlobalLock
TerminateProcess
UnhandledExceptionFilter
WaitForSingleObject
WideCharToMultiByte
_lclose
_lcreat
_llseek
_lopen
_lread
_lwrite
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrlenA
GlobalHandle
GlobalFree
GlobalDeleteAtom
GlobalAlloc
GlobalAddAtomA
GetTickCount
GetThreadLocale
GetSystemTimeAsFileTime
GetSystemTime
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetLastError
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetAtomNameA
GetACP
FreeLibrary
FindFirstFileA
FindClose
DeleteFileA
DeleteAtom
CreateThread
CreateFileW
CloseHandle
AddAtomA
GetModuleHandleW
VirtualAllocEx
GetCommandLineA
GetFileAttributesA
SystemTimeToFileTime
Sleep
user32
GetSysColorBrush
GetSystemMetrics
GetTopWindow
GetWindowDC
InsertMenuA
InvalidateRect
IsClipboardFormatAvailable
IsDlgButtonChecked
IsIconic
IsRectEmpty
IsWindow
IsWindowEnabled
IsWindowVisible
LoadAcceleratorsA
LoadCursorA
LoadStringA
LoadStringW
MessageBoxA
OffsetRect
OpenClipboard
PeekMessageA
PostMessageA
PostQuitMessage
RegisterClassA
RegisterClipboardFormatA
ReleaseCapture
ReleaseDC
ScreenToClient
ScrollWindow
SendDlgItemMessageA
SendMessageA
SetCapture
SetClipboardData
SetCursor
SetDlgItemTextA
SetFocus
SetRect
SetRectEmpty
SetScrollPos
SetWindowPos
SetWindowTextA
ShowWindow
SystemParametersInfoA
TranslateAcceleratorA
TranslateMessage
UpdateWindow
GetSysColor
GetSubMenu
GetScrollRange
GetScrollPos
GetMessageA
GetMenu
GetKeyState
GetDlgItemTextA
GetDC
GetClipboardData
GetClientRect
FillRect
EnumThreadWindows
EndPaint
EndDialog
EnableWindow
EnableScrollBar
EnableMenuItem
EmptyClipboard
DrawTextA
DrawIcon
DrawFocusRect
DispatchMessageA
DialogBoxParamA
DestroyWindow
DestroyMenu
DestroyIcon
DeleteMenu
DefWindowProcA
CreateWindowExA
CreatePopupMenu
CloseClipboard
CheckRadioButton
CheckDlgButton
CharUpperBuffA
CharNextA
CharLowerA
BringWindowToTop
BeginPaint
LoadIconW
LoadIconA
GetDlgItem
gdi32
SetTextColor
TextOutA
SetWindowOrgEx
SetWindowExtEx
SetTextAlign
SetLayout
SetBkMode
SetBkColor
SelectObject
PatBlt
TranslateCharsetInfo
GetEnhMetaFileA
GetStockObject
GetLayout
GetDeviceCaps
DeleteObject
CreateMetaFileA
CreateFontIndirectA
CopyMetaFileA
CloseMetaFile
GetTextExtentPoint32A
comdlg32
GetSaveFileNameA
GetOpenFileNameA
advapi32
RegQueryValueA
RegOpenKeyExA
RegEnumKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegSetValueA
shell32
ShellAboutA
ExtractAssociatedIconA
DragQueryFileA
DragFinish
DragAcceptFiles
ShellExecuteExA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
shlwapi
PathFindExtensionW
msvcrt
_adjust_fdiv
strchr
memmove
exit
_XcptFilter
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
_vsnprintf
Sections
.text Size: 812KB - Virtual size: 812KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ