Static task
static1
Behavioral task
behavioral1
Sample
08c7006bd4b5cc80366c1f98bf4ea5af_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
08c7006bd4b5cc80366c1f98bf4ea5af_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
08c7006bd4b5cc80366c1f98bf4ea5af_JaffaCakes118
-
Size
392KB
-
MD5
08c7006bd4b5cc80366c1f98bf4ea5af
-
SHA1
cdd895d3878e38cfa1e1a466225f609b49595531
-
SHA256
bf617666ddd177e3384ef79de3ebfc1bea6ba4d3058df6eddf0174a0b9fe2576
-
SHA512
d28c2bafec2f7eb0869fc4d11a07b034ff17f4410b2950f7ce95ec01aeeed40a12bfaa927d43bf930019c749371a94f6cc3def4858f840138af4b024db9397d4
-
SSDEEP
6144:C4JCWI36aRAQsIGv0d8LiAiguLBwDB6h6/S/LYoyhHOhb1oTxpf9vg7MkfkPxdy1:pJCHRAQsIGv0d8LiA10BG/GaIb1EGHn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08c7006bd4b5cc80366c1f98bf4ea5af_JaffaCakes118
Files
-
08c7006bd4b5cc80366c1f98bf4ea5af_JaffaCakes118.exe windows:4 windows x86 arch:x86
85010c17f7b44743f264640529c2dfe6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
ChooseFontW
ChooseFontA
FindTextA
PrintDlgA
comctl32
ImageList_BeginDrag
ImageList_SetIconSize
CreateUpDownControl
InitCommonControlsEx
ImageList_AddMasked
ImageList_Duplicate
CreateToolbarEx
user32
RegisterClassA
ArrangeIconicWindows
DdeQueryNextServer
EnumPropsW
GetScrollRange
ChangeMenuA
DefWindowProcA
RegisterClassExA
GetTabbedTextExtentW
GetClassNameW
LoadMenuIndirectW
SetScrollRange
GetClassWord
DrawTextExA
CheckMenuItem
EnumDisplaySettingsExW
GetGuiResources
SystemParametersInfoW
SetRectEmpty
SetMenuItemBitmaps
MapVirtualKeyExA
ToAsciiEx
ShowOwnedPopups
KillTimer
GetAsyncKeyState
SetParent
TranslateMDISysAccel
IsCharAlphaNumericA
CallMsgFilterW
BeginDeferWindowPos
InSendMessage
FreeDDElParam
SendNotifyMessageW
GetForegroundWindow
LoadKeyboardLayoutA
GetWindowLongW
RegisterClassExW
WindowFromDC
GetClipboardFormatNameW
CreateAcceleratorTableW
GetDlgItem
DdeInitializeW
DdeClientTransaction
DestroyAcceleratorTable
RegisterClipboardFormatA
DrawTextExW
IsIconic
SetDlgItemTextW
EnableMenuItem
MessageBoxExW
ShowScrollBar
DispatchMessageW
CreateWindowExW
GetDCEx
VkKeyScanExW
EnableWindow
ShowWindow
ValidateRect
EditWndProc
ValidateRgn
SetRect
DrawIcon
DefFrameProcA
RegisterWindowMessageW
DestroyWindow
TrackMouseEvent
ReuseDDElParam
MapDialogRect
DdeDisconnectList
MessageBoxW
IsCharAlphaNumericW
CloseWindowStation
kernel32
EnumSystemCodePagesA
WideCharToMultiByte
EnumDateFormatsW
GetVersionExA
QueryPerformanceCounter
TlsFree
InitializeCriticalSection
FlushFileBuffers
WriteConsoleW
DeleteAtom
GetOEMCP
VirtualQuery
GetModuleHandleA
FreeEnvironmentStringsW
GetFileSize
GetStringTypeA
SetHandleCount
EnumResourceLanguagesW
UnhandledExceptionFilter
GetEnvironmentStringsW
EnumSystemLocalesA
CompareStringW
GetAtomNameW
SetFilePointer
VirtualFreeEx
GetStartupInfoW
DeleteCriticalSection
GetModuleFileNameA
LeaveCriticalSection
HeapAlloc
GetTickCount
GetLogicalDrives
LockResource
OpenMutexA
GetProcAddress
GetCurrentThread
IsValidCodePage
GetACP
GetCurrentProcessId
GetModuleFileNameW
GetTimeZoneInformation
CloseHandle
GetSystemTimeAsFileTime
LCMapStringW
MultiByteToWideChar
GetSystemInfo
SetEnvironmentVariableA
GetLocaleInfoW
EnterCriticalSection
GetStringTypeW
FreeEnvironmentStringsA
VirtualProtect
LocalReAlloc
WriteFile
CreateMutexA
GetDriveTypeW
RtlUnwind
GetCPInfo
GetCommandLineW
VirtualAlloc
TlsGetValue
GetTimeFormatA
CreateMailslotA
TlsAlloc
HeapFree
IsValidLocale
GetStartupInfoA
GetCurrentProcess
CompareStringA
GetLastError
ExitProcess
ReadFile
GetLongPathNameW
GetLocaleInfoA
HeapReAlloc
GetCommandLineA
VirtualFree
SetLastError
GetEnvironmentStrings
lstrcmpi
FindResourceA
GetCurrentThreadId
LoadLibraryA
InterlockedExchange
TlsSetValue
GetDateFormatA
GetUserDefaultLCID
HeapCreate
TerminateProcess
WriteConsoleOutputW
HeapSize
SetStdHandle
IsBadWritePtr
GetStdHandle
HeapDestroy
SetTimeZoneInformation
GetFileType
LCMapStringA
shell32
SHGetDataFromIDListW
SHChangeNotify
SHFileOperation
advapi32
RegReplaceKeyW
StartServiceA
gdi32
DeleteObject
BeginPath
GetPath
GetMetaFileA
RectVisible
EndDoc
Sections
.text Size: 161KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ