Static task
static1
Behavioral task
behavioral1
Sample
0b8385b4e19f86bba5914f2f2986b7c9_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0b8385b4e19f86bba5914f2f2986b7c9_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0b8385b4e19f86bba5914f2f2986b7c9_JaffaCakes118
-
Size
184KB
-
MD5
0b8385b4e19f86bba5914f2f2986b7c9
-
SHA1
1cf1bcfe51ecd711f851d4a667405bafe29f3be0
-
SHA256
4bc54fe4080a43c03d7b359b390b563b20f26d4e2199001ccfacdd87a3f25780
-
SHA512
7c90aca340a2e02a9107a9d9aa4d00bf4205fca8eb1cf916b3e2eb7d6c63b31f09d25a757f8a4443a94f4236f411a5803b5694987df5b302010cee624e52b9bf
-
SSDEEP
3072:AyfXdHPR3r/AvT6YvDkIkNzhPL47nEOhh2awCrJQBQt48N:DdHtvYvIIkrcQOhh2awCrWR8N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b8385b4e19f86bba5914f2f2986b7c9_JaffaCakes118
Files
-
0b8385b4e19f86bba5914f2f2986b7c9_JaffaCakes118.exe windows:4 windows x86 arch:x86
cd2f2509db14630245585297607b2e9f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsFree
GetModuleHandleA
InterlockedDecrement
FreeLibrary
InterlockedIncrement
lstrcmpA
GetCurrentThreadId
GlobalFlags
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GetLocaleInfoA
GetCPInfo
GetOEMCP
HeapAlloc
HeapFree
HeapReAlloc
DeleteCriticalSection
RtlUnwind
RaiseException
ExitProcess
GetCommandLineA
GetProcessHeap
GetStartupInfoA
HeapSize
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetStdHandle
GetFileType
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetACP
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
GlobalGetAtomNameA
GetProcAddress
GetThreadLocale
FlushFileBuffers
SetFilePointer
LoadLibraryA
ReleaseSemaphore
CreateSemaphoreA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
SetLastError
Sleep
WaitForSingleObject
CreateFileA
GetModuleFileNameA
WriteFile
CloseHandle
GetCurrentProcess
GetSystemTimeAsFileTime
GetVersionExA
lstrlenA
CompareStringA
GetVersion
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
VirtualAlloc
user32
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
SetWindowPos
SetWindowLongA
IsWindow
GetDlgItem
GetFocus
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
UnregisterClassA
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
MessageBoxA
PostQuitMessage
DefWindowProcA
RegisterWindowMessageA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetSystemMetrics
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetWindowTextA
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
GetWindowThreadProcessId
SendMessageA
GetParent
gdi32
DeleteDC
CreateBitmap
GetStockObject
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
GetClipBox
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
ole32
CoInitializeEx
oleaut32
VariantInit
VariantClear
VariantChangeType
Sections
.text Size: 112KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ