Static task
static1
Behavioral task
behavioral1
Sample
1689ac9b2324880ec84821609dd183f2_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1689ac9b2324880ec84821609dd183f2_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1689ac9b2324880ec84821609dd183f2_JaffaCakes118
-
Size
136KB
-
MD5
1689ac9b2324880ec84821609dd183f2
-
SHA1
448b0e469baddaca7b0eb0ce6f0a78a439d2a1ef
-
SHA256
4438b65fed188c05506239076e7942deccd62a8bd05d85386ad69ca0d80fbadc
-
SHA512
e36ac5b2ef319bac1f32c52e04bc224da19e9f0cfe0419f9c073fe81f223d68086b851bcaf13fdb434d52b582ac6789f0665f2f0de798807340bc79a78dc5e9a
-
SSDEEP
3072:kUJ7tL3Mr9R5jwvh6KhaD1MpTi6hKmPRmfIkiyphMrQI4JlHFG:7Jpr0bwZ6K0MpOJvfpphKQI4Jl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1689ac9b2324880ec84821609dd183f2_JaffaCakes118
Files
-
1689ac9b2324880ec84821609dd183f2_JaffaCakes118.exe windows:4 windows x86 arch:x86
bbbe8d665b19698463f84cee1e65e8ec
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
ProcessIdToSessionId
GetBinaryTypeA
WritePrivateProfileStructA
Module32Next
GetFileAttributesExA
GetStartupInfoA
lstrcmp
FreeEnvironmentStringsA
GetTimeZoneInformation
GetAtomNameA
GetConsoleMode
FindCloseChangeNotification
GetCalendarInfoA
FindFirstFileExA
WriteConsoleA
CreateDirectoryA
BeginUpdateResourceA
FindResourceExA
EndUpdateResourceA
GetModuleHandleA
RemoveDirectoryA
ReadConsoleInputA
SetConsoleActiveScreenBuffer
WriteConsoleInputA
QueryPerformanceCounter
GetFileInformationByHandle
SetComputerNameA
SetConsoleInputExeNameA
SetConsoleTitleA
MoveFileExA
ReleaseMutex
AddAtomA
LoadLibraryExW
HeapUnlock
GlobalFindAtomA
OpenEventA
GetStringTypeExA
ExpandEnvironmentStringsA
WriteConsoleOutputA
GetConsoleWindow
SetFileShortNameA
SetFileAttributesA
ReadConsoleA
SetConsoleHardwareState
SetEnvironmentVariableA
SetCommState
CloseHandle
GetExpandedNameA
GetPrivateProfileSectionNamesA
GlobalLock
CopyFileExA
FlushFileBuffers
VirtualAllocEx
GetVolumePathNameA
GetCurrentDirectoryA
Thread32First
GetConsoleTitleA
ExpungeConsoleCommandHistoryA
SetVolumeMountPointA
BuildCommDCBA
LocalHandle
GetCommMask
ReadConsoleOutputCharacterA
GetDevicePowerState
_lwrite
EnumResourceTypesA
GlobalGetAtomNameA
GetFileInformationByHandle
ReadConsoleOutputCharacterA
FindVolumeClose
GetProcessShutdownParameters
WideCharToMultiByte
GetLogicalDrives
OpenMutexA
GetProcessHeap
FindFirstVolumeMountPointA
GetConsoleAliasExesLengthA
LocalCompact
GetProcessIoCounters
CreateFileMappingA
SetThreadAffinityMask
DefineDosDeviceA
GetProcessHandleCount
GetDllDirectoryA
winmm
timeGetSystemTime
user32
PrivateExtractIconExA
TranslateAcceleratorA
MessageBoxExA
NotifyWinEvent
IsDialogMessageA
SetWindowsHookA
SetDlgItemInt
GetMonitorInfoA
GetPriorityClipboardFormat
GetKeyNameTextA
EnterReaderModeHelper
ReasonCodeNeedsBugID
SetActiveWindow
OpenDesktopA
EnumPropsExA
PeekMessageA
GetUserObjectSecurity
GetMenuState
AdjustWindowRect
SetForegroundWindow
PostThreadMessageA
GetProcessWindowStation
SendIMEMessageExA
SetLastErrorEx
InvalidateRgn
GetRawInputBuffer
GetWindowTextA
GetKeyboardLayoutList
CharUpperBuffA
SetScrollInfo
EnumClipboardFormats
LoadAcceleratorsA
FindWindowExA
CallWindowProcA
RegisterDeviceNotificationA
RegisterWindowMessageA
DrawIconEx
FillRect
CloseDesktop
CloseWindow
SwapMouseButton
OpenIcon
InvalidateRect
LoadIconA
EnumPropsA
GetDesktopWindow
GetDlgItemInt
BroadcastSystemMessageExW
PeekMessageA
NotifyWinEvent
RegisterClassExA
IsCharUpperA
SendNotifyMessageA
GetClipboardFormatNameA
CallNextHookEx
RecordShutdownReason
CascadeChildWindows
MapVirtualKeyA
DestroyCaret
MonitorFromWindow
EnumThreadWindows
GetComboBoxInfo
FreeDDElParam
GetClipboardSequenceNumber
IsCharLowerA
SetDlgItemTextA
DlgDirListA
SetPropA
GetReasonTitleFromReasonCode
GetRawInputBuffer
GetAppCompatFlags2
GetTitleBarInfo
DrawTextExW
ReplyMessage
RegisterClipboardFormatA
LoadMenuIndirectA
GetKeyboardLayoutNameA
GetUpdateRgn
GetLayeredWindowAttributes
SetClipboardViewer
CopyRect
GetAppCompatFlags
Sections
.idata Size: - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.itext Size: 120KB - Virtual size: 388KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ