Static task
static1
Behavioral task
behavioral1
Sample
6715cd1ffb125143fe38cffb61e501d0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6715cd1ffb125143fe38cffb61e501d0_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
6715cd1ffb125143fe38cffb61e501d0_JaffaCakes118
-
Size
812KB
-
MD5
6715cd1ffb125143fe38cffb61e501d0
-
SHA1
7e6916afb7f2d7d3fad5a16fb8fb27c2fa6ff57f
-
SHA256
03a9c8fac6c371c237d5188e5df778255afde854ea0bf9a982fc07cb52faa46e
-
SHA512
29b4f719aba72c4b5a9b453cd28398a031e485ed286dba52ec2e197f09a070fdf4f085c4a07c42e4c49fe5c1ba6a56f15e60d691a148a954813b1a2c7ce9ad02
-
SSDEEP
12288:/jGxx/x4lGjPieFGPc/FjG/qVTHs15K4G7W084FWdx7xZuv:rfKzD/9oqO1s4Gy4Un7xZuv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6715cd1ffb125143fe38cffb61e501d0_JaffaCakes118
Files
-
6715cd1ffb125143fe38cffb61e501d0_JaffaCakes118.exe windows:5 windows x86 arch:x86
aaeb5721ea61d49dfa20c197f2927ca6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
ImageList_Create
ImageList_Destroy
ImageList_ReplaceIcon
ImageList_SetBkColor
ImageList_BeginDrag
ImageList_EndDrag
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_SetDragCursorImage
ImageList_DragShowNolock
ImageList_GetDragImage
kernel32
GetFullPathNameA
GetFileAttributesA
GetExitCodeProcess
GetEnvironmentVariableA
GetDriveTypeA
GetDiskFreeSpaceA
GetCurrentThread
GetCurrentProcess
GetCurrentDirectoryA
GetComputerNameA
GetACP
FreeResource
InterlockedExchange
FreeLibrary
FormatMessageA
GetLocalTime
FindResourceA
FindNextFileA
FindFirstFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
DeleteFileA
CreateThread
CreateProcessA
CreateNamedPipeA
CreateMutexA
LCMapStringA
GetStringTypeW
GetStringTypeA
HeapReAlloc
HeapAlloc
GetOEMCP
GetCPInfo
HeapFree
HeapCreate
HeapDestroy
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
RtlUnwind
GetLocaleInfoA
GetLogicalDrives
GetModuleFileNameA
GetPrivateProfileStringA
GetProcAddress
GetProfileStringA
GetShortPathNameA
GetSystemDefaultLCID
GetSystemDirectoryA
GetSystemInfo
GetUserDefaultLangID
GetWindowsDirectoryA
GlobalAddAtomA
GlobalAlloc
GlobalDeleteAtom
GlobalFree
GlobalLock
GlobalHandle
GlobalReAlloc
GlobalUnlock
IsBadWritePtr
IsDBCSLeadByte
LoadLibraryA
LoadResource
LocalFileTimeToFileTime
LockResource
MoveFileA
MoveFileExA
MulDiv
OpenMutexA
OpenProcess
ReleaseMutex
RemoveDirectoryA
SetCurrentDirectoryA
SetErrorMode
SetFileAttributesA
SetFileTime
SetLastError
SetNamedPipeHandleState
SizeofResource
Sleep
TerminateProcess
TerminateThread
TransactNamedPipe
WaitForSingleObject
WritePrivateProfileStringA
WriteProfileStringA
lstrcmpA
LCMapStringW
GetFileType
GetSystemTime
GetFileSize
GetStdHandle
RaiseException
ReadFile
SetEndOfFile
SetFilePointer
WriteFile
GetCommandLineA
GetLastError
GetModuleHandleA
MultiByteToWideChar
TlsGetValue
TlsSetValue
WideCharToMultiByte
LocalAlloc
LocalFree
VirtualAlloc
VirtualFree
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetStartupInfoA
GetVersionExA
ExitProcess
GetTickCount
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
LoadLibraryW
GetVersion
FlushFileBuffers
user32
FindWindowA
FillRect
ExitWindowsEx
EqualRect
EnumWindows
EnumThreadWindows
EndPaint
EnableWindow
EnableMenuItem
DrawTextA
DrawMenuBar
DrawIconEx
DrawIcon
DrawFrameControl
DrawFocusRect
DispatchMessageA
DestroyWindow
DestroyMenu
DestroyIcon
DestroyCursor
DeleteMenu
DefWindowProcA
DefMDIChildProcA
DefFrameProcA
CreateWindowExA
CreatePopupMenu
CreateMenu
CreateIcon
ClientToScreen
CheckMenuItem
CallWindowProcW
CallWindowProcA
CallNextHookEx
BringWindowToTop
CharPrevA
CharNextA
CharLowerBuffA
CharLowerA
CharUpperBuffA
CharToOemBuffA
GetClientRect
GetCursor
GetCursorPos
GetDC
GetDCEx
GetDesktopWindow
GetFocus
GetForegroundWindow
GetIconInfo
GetKeyNameTextA
GetKeyState
GetLastActivePopup
GetMenu
GetMenuItemCount
GetMenuState
GetMenuStringA
GetMessageA
GetMessagePos
GetWindow
GetParent
GetPropA
FrameRect
GetSubMenu
GetSysColor
GetSystemMenu
GetSystemMetrics
GetWindowLongA
GetWindowPlacement
GetWindowRect
GetWindowRgn
GetWindowTextA
GetWindowThreadProcessId
InflateRect
InsertMenuA
InsertMenuItemA
InvalidateRect
IsDialogMessageA
IsIconic
IsRectEmpty
IsWindow
IsWindowEnabled
IsWindowVisible
IsZoomed
KillTimer
LoadBitmapA
LoadCursorA
LoadIconA
LoadStringA
MapVirtualKeyA
MapWindowPoints
MessageBeep
MsgWaitForMultipleObjects
OemToCharA
OemToCharBuffA
OffsetRect
PeekMessageA
PostMessageA
PostQuitMessage
PtInRect
RegisterClassA
RegisterWindowMessageA
MessageBoxA
UpdateWindow
ReleaseCapture
ReleaseDC
RemoveMenu
RemovePropA
ScreenToClient
ScrollWindow
SendMessageA
SendMessageW
SendMessageTimeoutA
SendNotifyMessageA
SetActiveWindow
SetCapture
SetCursor
SetFocus
SetForegroundWindow
SetMenu
SetPropA
SetRect
SetScrollInfo
SetScrollPos
SetTimer
SetWindowLongA
GetActiveWindow
GetCapture
GetClassInfoA
GetScrollPos
GetClassInfoW
SetWindowLongW
SetWindowPlacement
SetWindowPos
SetWindowTextA
SetWindowsHookExA
SetWindowRgn
ShowCursor
ShowOwnedPopups
ShowWindow
SystemParametersInfoA
TrackPopupMenu
TranslateMDISysAccel
TranslateMessage
UnhookWindowsHookEx
UnregisterClassA
IntersectRect
gdi32
PatBlt
MoveToEx
LineTo
LineDDA
IntersectClipRect
GetWindowOrgEx
GetTextMetricsA
GetTextExtentPointA
GetTextExtentPoint32A
GetTextColor
GetSystemPaletteEntries
GetStockObject
Pie
GetPaletteEntries
GetObjectA
GetDeviceCaps
GetDIBits
GetCurrentPositionEx
GetClipBox
ExtFloodFill
ExcludeClipRect
EnumFontsA
Ellipse
DeleteObject
DeleteDC
CreateSolidBrush
CreateRectRgn
CreatePenIndirect
CreatePalette
CreateFontIndirectA
CreateDIBitmap
CreateCompatibleDC
CreateCompatibleBitmap
CreateBrushIndirect
CreateBitmap
Chord
CreateFontIndirectW
Polyline
RealizePalette
RectVisible
Rectangle
RemoveFontResourceA
RestoreDC
RoundRect
SaveDC
SelectObject
SelectPalette
SetBkColor
SetBkMode
SetPixel
SetROP2
SetStretchBltMode
SetTextColor
SetViewportOrgEx
SetWindowOrgEx
StretchBlt
StretchDIBits
TextOutA
GetPixel
UnrealizeObject
comdlg32
GetOpenFileNameA
advapi32
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueA
GetUserNameA
AllocateLocallyUniqueId
OpenEventLogA
AdjustTokenPrivileges
AllocateAndInitializeSid
EqualSid
FreeSid
GetTokenInformation
RegSetValueExA
shell32
SHGetFileInfoA
ShellExecuteA
ShellExecuteExA
ExtractIconA
Sections
.text Size: 520KB - Virtual size: 516KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hc4047 Size: 12KB - Virtual size: 26.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 256KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ