Static task
static1
Behavioral task
behavioral1
Sample
0c568865fc2e846be067be46c57ed0f4_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0c568865fc2e846be067be46c57ed0f4_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0c568865fc2e846be067be46c57ed0f4_JaffaCakes118
-
Size
292KB
-
MD5
0c568865fc2e846be067be46c57ed0f4
-
SHA1
9652552e95feb152bcefc8edecf90ea98d73b56e
-
SHA256
c77a20463da4235871d5ce57dfd0e7dee628dc509582bc68d28caa331915c1d2
-
SHA512
b847f185cb7eb671026eb25b6ebc467d8bd42e056e3248ec2e0c9902a0d8254274ff06ff7305806f12b66c36a7aebfc1ebafa638861f4f3ac71686dd15cb7878
-
SSDEEP
6144:iX+h1rvMAT4amzXq7r78r0ZtK233IYfkv:iOsA8amy8kT33IEkv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c568865fc2e846be067be46c57ed0f4_JaffaCakes118
Files
-
0c568865fc2e846be067be46c57ed0f4_JaffaCakes118.exe windows:4 windows x86 arch:x86
dc801efba9889cf0be5409d373da8f36
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EndUpdateResourceA
DeleteAtom
GetCurrentDirectoryA
FileTimeToLocalFileTime
SetFilePointer
DeleteTimerQueue
IsSystemResumeAutomatic
OpenWaitableTimerA
GetExitCodeProcess
GetDllDirectoryA
ReadFileEx
UpdateResourceA
EnumResourceNamesA
RegisterWaitForInputIdle
ClearCommError
CallNamedPipeA
GetVersion
GlobalFix
FindAtomA
GlobalFlags
ReadConsoleInputA
GetFileAttributesExA
SetDefaultCommConfigA
GetSystemDirectoryA
GlobalFindAtomA
GetProcessHeaps
GetSystemRegistryQuota
IsValidCodePage
GlobalLock
GetThreadTimes
GetTimeZoneInformation
WriteProcessMemory
HeapReAlloc
LZClose
GetDefaultCommConfigA
GetTempFileNameA
GetDriveTypeA
GetComputerNameA
GetProcessId
GetCurrentThreadId
FileTimeToSystemTime
OpenWaitableTimerA
CreateSemaphoreA
OpenFileMappingA
LocalLock
HeapCreate
DefineDosDeviceA
GetNativeSystemInfo
GetLocalTime
SetMessageWaitingIndicator
GetConsoleCommandHistoryA
WritePrivateProfileSectionA
WriteFile
ReadConsoleA
IsBadStringPtrA
EnumTimeFormatsA
SetFileApisToANSI
FindNextVolumeA
OpenSemaphoreA
SetComputerNameExA
VirtualAllocEx
WriteConsoleOutputCharacterW
CreateTimerQueueTimer
WriteConsoleOutputA
GetThreadPriority
WriteConsoleOutputCharacterA
GetProcessPriorityBoost
SetTapePosition
GetSystemTimeAdjustment
SetComputerNameExW
GetLocalTime
GetCommTimeouts
GetSystemTime
OpenJobObjectA
OutputDebugStringA
GetDefaultCommConfigA
GetConsoleTitleA
GetProfileSectionA
GlobalMemoryStatusEx
WriteConsoleInputA
GetLogicalDriveStringsA
FormatMessageA
WriteFileGather
lstrcpyn
HeapSize
TransmitCommChar
_llseek
CloseHandle
SetHandleContext
IsValidCodePage
ReadFileScatter
ReadConsoleA
winmm
timeGetSystemTime
user32
EndDialog
ChangeDisplaySettingsExA
GetThreadDesktop
SetWindowsHookA
UnhookWindowsHookEx
SetSystemCursor
GetWindowTextA
GetClassNameA
SetScrollRange
IsWindowVisible
GetRawInputBuffer
SetMessageQueue
MessageBoxTimeoutA
GetClientRect
FlashWindow
ImpersonateDdeClientWindow
EnumDisplaySettingsA
GetKeyboardState
LoadStringA
DlgDirListComboBoxA
GetSysColor
ToAsciiEx
IsCharLowerA
SetRect
GetKeyboardState
AllowSetForegroundWindow
EnumPropsExA
GetRawInputData
HideCaret
MapVirtualKeyExA
GetUserObjectInformationA
DragObject
GetInputState
DrawIconEx
UnlockWindowStation
DeregisterShellHookWindow
SendIMEMessageExA
ScreenToClient
MapVirtualKeyA
GetMenuState
SendMessageCallbackA
GetUserObjectInformationA
DlgDirListComboBoxW
ChangeDisplaySettingsExW
GetUserObjectInformationA
TranslateMessage
GetLastInputInfo
CreateWindowStationA
GetRawInputBuffer
TileChildWindows
DeviceEventWorker
MonitorFromPoint
TabbedTextOutA
BeginDeferWindowPos
DlgDirListA
SetWindowsHookExW
SetMenu
CreateDesktopA
PrivateExtractIconsA
SetCursorContents
GetTabbedTextExtentA
GetWindowInfo
EnumDisplayDevicesA
DlgDirSelectExA
SetCursorContents
GetUserObjectInformationA
ChangeDisplaySettingsExA
GetUserObjectInformationA
GetLastInputInfo
SetWindowWord
GetWindowRect
GetClipboardViewer
SetLayeredWindowAttributes
MessageBoxExA
GetWindowRect
GetQueueStatus
DialogBoxIndirectParamA
MonitorFromPoint
GetKeyboardLayoutList
OffsetRect
DestroyIcon
MapVirtualKeyExA
TranslateMessage
SetActiveWindow
ChildWindowFromPoint
CreateWindowStationA
CharUpperBuffA
GetMenu
Sections
.idata Size: - Virtual size: 520B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.itext Size: 276KB - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ