Static task
static1
Behavioral task
behavioral1
Sample
08c70eeb3dbb07d1d4a90a794c569e58_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
08c70eeb3dbb07d1d4a90a794c569e58_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
08c70eeb3dbb07d1d4a90a794c569e58_JaffaCakes118
-
Size
1.5MB
-
MD5
08c70eeb3dbb07d1d4a90a794c569e58
-
SHA1
271a2713782d2e53dfb7ee5d0af7eacbac220954
-
SHA256
1690c3677b352f74bd5dc85505865541b3e8201a7ea4961e4d4ddbefe6344c62
-
SHA512
36c1a189a171869b91f8b1b9d959c4490c8f7debc2cb5e82a291b690b29263d7fccae89690eb634a1ae3467f28c7c027a4555f2ced69a8f744476bb65ddbcaeb
-
SSDEEP
24576:tvfQpeec99Fe1kzhKx1jaklpEyuWoQB103bMCWdW5:tHsx1zpUWoQBcWdW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08c70eeb3dbb07d1d4a90a794c569e58_JaffaCakes118
Files
-
08c70eeb3dbb07d1d4a90a794c569e58_JaffaCakes118.exe windows:4 windows x86 arch:x86
0d04a9c1be2d947994258924e6e52b34
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetPrivateProfileStructA
WritePrivateProfileStructA
GetCurrentProcess
lstrcpyA
SetPriorityClass
GetShortPathNameA
GetSystemTimeAsFileTime
GlobalUnlock
CreateEventA
lstrcmpA
GlobalReAlloc
SetThreadPriority
MultiByteToWideChar
GetDriveTypeA
GetSystemTime
GetStartupInfoA
WritePrivateProfileStringA
GetPrivateProfileStringA
Sleep
CreateThread
WaitForSingleObject
CloseHandle
GetModuleFileNameA
FindResourceA
LoadResource
LockResource
MulDiv
GetTickCount
GlobalAlloc
ExitProcess
CopyFileA
CreateSemaphoreA
GetLastError
ReleaseSemaphore
GetFullPathNameA
FindNextFileA
TerminateThread
MoveFileA
CreateFileA
ReadFile
SetFilePointer
WriteFile
SetEndOfFile
FreeLibrary
lstrcpynA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateDirectoryA
FindFirstFileA
FindClose
WideCharToMultiByte
CreateProcessA
lstrcmpiA
DeleteFileA
GetTempPathA
GetTempFileNameA
GetPrivateProfileIntA
SetCurrentDirectoryA
GetCurrentDirectoryA
RemoveDirectoryA
SystemTimeToFileTime
GlobalLock
GlobalFree
GetModuleHandleA
user32
LoadCursorA
SetCursor
ClientToScreen
GetUpdateRect
BeginPaint
GetCursorPos
EndPaint
GetForegroundWindow
CopyRect
IsWindow
FindWindowA
PostMessageA
SetWindowLongA
SetParent
FindWindowExA
DefWindowProcA
IsChild
CheckMenuItem
SetWindowTextA
GetWindowDC
ReleaseDC
DestroyWindow
CreateDialogParamA
GetDlgItem
GetWindowRect
ScreenToClient
SetWindowPos
InvalidateRect
SendMessageA
GetDlgItemTextA
DrawTextA
SetForegroundWindow
ShowWindow
GetParent
TrackPopupMenu
ReleaseCapture
SetCapture
CreateWindowExA
IsWindowVisible
GetWindowLongA
EnableWindow
LoadImageA
wsprintfA
GetSubMenu
EndDialog
MessageBoxA
GetAsyncKeyState
DispatchMessageA
GetMessageA
GetSystemMetrics
SetFocus
UnregisterClassA
FillRect
EnumDisplaySettingsA
SetRect
SystemParametersInfoA
CharPrevA
DestroyIcon
DestroyCursor
BeginDeferWindowPos
DeferWindowPos
EndDeferWindowPos
SetWindowRgn
wvsprintfA
CheckRadioButton
SetDlgItemInt
GetDlgItemInt
DrawIconEx
SetTimer
WindowFromPoint
RegisterClipboardFormatA
SetClassLongA
DialogBoxParamA
LoadBitmapA
IsDlgButtonChecked
CreatePopupMenu
DestroyMenu
PostQuitMessage
UpdateWindow
LoadMenuA
GetSystemMenu
InsertMenuA
GetMenuItemInfoA
InsertMenuItemA
LoadIconA
RegisterClassA
GetClassInfoA
RegisterWindowMessageA
LoadStringA
LoadAcceleratorsA
RemoveMenu
GetClassLongA
IsDialogMessageA
TranslateAcceleratorA
TranslateMessage
CharNextA
CallWindowProcA
SendDlgItemMessageA
PeekMessageA
SetDlgItemTextA
GetDC
GetWindowTextA
RegisterClassExA
CheckDlgButton
SetCursorPos
gdi32
DeleteDC
GetDIBits
SelectObject
CreateCompatibleDC
SetBkMode
SetTextColor
LineTo
MoveToEx
UpdateColors
RealizePalette
SelectPalette
BitBlt
CreateDIBSection
CreatePalette
GetDeviceCaps
CreateBrushIndirect
GetNearestColor
GetPixel
CreateFontA
CreateCompatibleBitmap
StretchBlt
ExtSelectClipRgn
Rectangle
IntersectClipRect
SetBkColor
GetStockObject
CreatePen
TextOutA
CreateRectRgn
CreatePolyPolygonRgn
GetTextExtentPoint32A
CreateSolidBrush
GetObjectA
RoundRect
GetBkColor
GetTextColor
DeleteObject
GetDIBColorTable
advapi32
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegDeleteValueA
RegSetValueExA
RegDeleteKeyA
RegEnumKeyA
RegEnumKeyExA
RegOpenKeyExA
shell32
ShellExecuteA
SHGetMalloc
DragQueryPoint
DragQueryFileA
DragFinish
SHBrowseForFolderA
SHGetPathFromIDListA
Shell_NotifyIconA
comctl32
ord17
ole32
CoCreateGuid
CoRevokeClassObject
RevokeDragDrop
OleUninitialize
OleInitialize
RegisterDragDrop
CoRegisterClassObject
CoInitialize
CLSIDFromString
CoCreateInstance
comdlg32
GetSaveFileNameA
GetOpenFileNameA
msvcrt
_XcptFilter
_onexit
__dllonexit
__CxxFrameHandler
_purecall
malloc
free
strtol
fwrite
qsort
ceil
__mb_cur_max
_isctype
_pctype
mbstowcs
wcstombs
??2@YAPAXI@Z
srand
sprintf
_except_handler3
toupper
fseek
ftell
realloc
fputc
memset
_exit
exit
memcmp
fgets
atoi
??3@YAXPAX@Z
strncpy
strlen
strcmp
strncmp
fprintf
sqrt
sin
pow
strcat
fopen
fread
fclose
_mbsstr
memcpy
_CIpow
rand
_ftol
_acmdln
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_stricmp
_controlfp
_strnicmp
_strdup
Sections
DATA Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 601B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CODE Size: 1KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ