Static task
static1
Behavioral task
behavioral1
Sample
0c3f298a4e91c07e8a84cf41a1f365a0_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0c3f298a4e91c07e8a84cf41a1f365a0_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0c3f298a4e91c07e8a84cf41a1f365a0_JaffaCakes118
-
Size
248KB
-
MD5
0c3f298a4e91c07e8a84cf41a1f365a0
-
SHA1
d3fe0738fbf18eccf0b68760be09a24656e331b6
-
SHA256
d794130dc042f79371c612b353bd8ba069156fee680ac90475cb0621d4d8350c
-
SHA512
5c149ddc7c1b04b1087f3cf09d1b7ad2bf1ffb4bfe3de1afbdb0680006039e1eac77021409190bd61a2d9c3b62a6b929245c544bcccd603de65d0f79139b9faa
-
SSDEEP
6144:6SvscaBQj/tEL5pTcOYvMs/8+7k6KxxCyQIwfrE:HE3L5hcObi8+7Ex
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c3f298a4e91c07e8a84cf41a1f365a0_JaffaCakes118
Files
-
0c3f298a4e91c07e8a84cf41a1f365a0_JaffaCakes118.exe windows:4 windows x86 arch:x86
14d60a06ec69ab445e58802b6b892a5c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
GetOEMCP
SetErrorMode
RtlUnwind
GetDriveTypeA
GetSystemTimeAsFileTime
SetEnvironmentVariableA
SetCurrentDirectoryA
HeapAlloc
HeapFree
HeapReAlloc
VirtualAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
ExitProcess
RaiseException
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
GetACP
GetStringTypeW
GetTimeZoneInformation
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
GetThreadLocale
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
GetCurrentDirectoryA
FindFirstFileA
FindClose
InterlockedDecrement
GetModuleFileNameW
LocalFree
MulDiv
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GlobalUnlock
GlobalFree
FreeResource
GetCurrentProcessId
SetLastError
GlobalAddAtomA
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
GetModuleFileNameA
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryA
GlobalLock
lstrcmpA
GlobalAlloc
FreeLibrary
GlobalDeleteAtom
GetModuleHandleA
GetProcAddress
lstrlenA
CompareStringW
CompareStringA
GetVersion
MultiByteToWideChar
InterlockedExchange
CreateFileA
GetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
CloseHandle
GetLastError
FormatMessageA
GetPrivateProfileStringA
WritePrivateProfileStringA
WideCharToMultiByte
FileTimeToLocalFileTime
FileTimeToSystemTime
FindResourceA
LoadResource
LockResource
GetStringTypeA
SizeofResource
user32
UnregisterClassA
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
SetForegroundWindow
UpdateWindow
GetMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
SetWindowPos
WindowFromPoint
ScreenToClient
ReleaseDC
GetDC
CopyRect
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
DrawIcon
AppendMenuA
SetMenuItemInfoA
GetSubMenu
LoadMenuA
SendMessageA
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
GetSysColorBrush
DestroyMenu
EndPaint
BeginPaint
GetSystemMenu
IsIconic
GetClientRect
InvalidateRect
EnableWindow
LoadCursorA
LoadIconA
GetSystemMetrics
SetCursor
CharUpperA
PostQuitMessage
PostMessageA
CheckMenuItem
EnableMenuItem
GetMenuState
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
gdi32
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
CreateFontIndirectA
GetObjectA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
DragQueryFileA
ShellExecuteA
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ