Static task
static1
Behavioral task
behavioral1
Sample
a8b931811e8a8bdb83e0aff2e1c6e560_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a8b931811e8a8bdb83e0aff2e1c6e560_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
a8b931811e8a8bdb83e0aff2e1c6e560_JaffaCakes118
-
Size
576KB
-
MD5
a8b931811e8a8bdb83e0aff2e1c6e560
-
SHA1
b0e06e950016a5a4ae574bb14334fa629708a67a
-
SHA256
6d49983e65549c5a36b43c14ae4a0fbf126bbb3291ebdf5b31b0cc7219646909
-
SHA512
35739a276e901e9ee66f6f2a3e9638ca4895635068685957866d2831fd4d4cb72a1d0b0d81932abf8f162a0e3d1bf8e7c6c515cf931ba9711a9d4cce678028d6
-
SSDEEP
12288:76v/QO1vCNvRDKh214aEl/zNRnVIOgCTW06KZ9nisXz:76v/Q4CNpDKMylrdIdy6G9is
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a8b931811e8a8bdb83e0aff2e1c6e560_JaffaCakes118
Files
-
a8b931811e8a8bdb83e0aff2e1c6e560_JaffaCakes118.exe windows:5 windows x86 arch:x86
be95e9477bc11d4f34237622c0a11132
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadCursorW
SetWindowTextW
LoadIconW
RegisterClassExW
LoadBitmapW
ExitWindowsEx
BringWindowToTop
GetSubMenu
CallNextHookEx
GetMenuItemCount
GetMenuItemID
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuW
EnableMenuItem
CheckMenuItem
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
SetActiveWindow
GetMessageTime
GetMessagePos
MapWindowPoints
UpdateWindow
GetMenu
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
MessageBeep
IsChild
GetTopWindow
GetNextDlgTabItem
GetNextDlgGroupItem
ReleaseCapture
GetDesktopWindow
SetCapture
GetClientRect
GetWindowRect
SetCursor
SetRect
IsRectEmpty
CopyAcceleratorTableW
OffsetRect
PtInRect
CharNextW
GetFocus
SetFocus
MoveWindow
GetDlgCtrlID
IsWindow
IsDialogMessageW
SendDlgItemMessageW
GetDlgItem
CharUpperW
SetWindowsHookExW
CreateWindowExW
GetActiveWindow
GetKeyState
GetCursorPos
GetWindowTextW
GetSysColorBrush
UnhookWindowsHookEx
IntersectRect
CopyRect
GetSysColor
GetWindowDC
GetDC
ClientToScreen
RegisterClipboardFormatW
InvalidateRgn
MessageBoxW
LoadStringW
RedrawWindow
GetSystemMetrics
DrawStateW
PostThreadMessageW
InvalidateRect
SystemParametersInfoW
EndPaint
ReleaseDC
DrawTextW
BeginPaint
SetForegroundWindow
DestroyMenu
EndDialog
CreateDialogIndirectParamW
UnregisterClassA
EqualRect
ShowWindow
SetWindowPos
IsWindowVisible
ValidateRect
DefWindowProcW
GetWindowLongW
DestroyWindow
DispatchMessageW
TranslateMessage
GetMessageW
PostMessageW
PeekMessageW
SetWindowLongW
GrayStringW
DrawTextExW
TabbedTextOutW
PostQuitMessage
GetWindow
SetWindowContextHelpId
MapDialogRect
GetWindowThreadProcessId
SendMessageW
GetParent
GetLastActivePopup
IsWindowEnabled
EnableWindow
GetMenuState
comdlg32
GetFileTitleW
shell32
ShellExecuteW
SHGetFolderPathW
ole32
CoTaskMemAlloc
OleUninitialize
OleInitialize
CoTaskMemFree
advapi32
RegCloseKey
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegDeleteKeyW
RegSetValueExW
RegQueryValueExW
RegOpenKeyW
RegEnumKeyW
RegQueryValueW
RegOpenKeyExW
RegCreateKeyExW
gdi32
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetClipBox
SetBkColor
RestoreDC
TextOutW
GetDeviceCaps
GetObjectW
SetBkMode
GetStockObject
DeleteObject
SetTextColor
SelectObject
ExtTextOutW
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
CreateBitmap
ScaleViewportExtEx
SaveDC
SetMapMode
GetRgnBox
GetTextColor
GetBkColor
GetMapMode
CreateRectRgnIndirect
CreateFontIndirectW
DPtoLP
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
kernel32
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCPInfo
GetOEMCP
IsValidCodePage
LCMapStringA
FlushFileBuffers
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetStringTypeA
RaiseException
EnumSystemLocalesA
GetWindowsDirectoryW
GetTempPathW
GetCurrentDirectoryW
GetDiskFreeSpaceExW
GetFullPathNameW
CopyFileW
DeleteFileW
SetFileAttributesW
GetFileAttributesW
MultiByteToWideChar
SetEndOfFile
LoadLibraryW
FreeLibrary
CreateFileW
BeginUpdateResourceW
UpdateResourceW
EndUpdateResourceW
WriteFile
ReadFile
SetFilePointerEx
FindResourceExW
CreateMutexW
ReleaseMutex
GetCurrentThreadId
GetUserDefaultLCID
GetSystemDefaultLangID
SetCurrentDirectoryW
CreateThread
WaitForSingleObject
CloseHandle
GetModuleFileNameW
GetLastError
Sleep
FindResourceW
LoadResource
LockResource
LCMapStringW
SizeofResource
GetProcAddress
GetLocaleInfoA
GetACP
GetTickCount
GlobalFlags
GlobalAddAtomW
GlobalFindAtomW
CompareStringW
LoadLibraryA
GetVersionExA
GetFileTime
GetVolumeInformationW
DuplicateHandle
GetFileSize
UnlockFile
LockFile
GetLocalTime
GetCurrentProcess
IsDebuggerPresent
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetModuleHandleA
WideCharToMultiByte
GetCurrentProcessId
SetFilePointer
InitializeCriticalSectionAndSpinCount
RtlUnwind
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
GetStringTypeW
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 447KB - Virtual size: 446KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ