Static task
static1
Behavioral task
behavioral1
Sample
269298cb2dbcfdcf676b2b9a7a56f020_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
269298cb2dbcfdcf676b2b9a7a56f020_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
269298cb2dbcfdcf676b2b9a7a56f020_JaffaCakes118
-
Size
164KB
-
MD5
269298cb2dbcfdcf676b2b9a7a56f020
-
SHA1
c3a26d7ddc4adefd3af9043d25cb57ec24fb3d22
-
SHA256
ab7f5ead2eb48c0fe6d640b34630172af9ad3a4b377aaf703d9d91012d99927e
-
SHA512
9cead413b83b59a201effa67ad14eee3218fab9d6d115c16b2b538ca43a48a84f0a9f2a6316a8f7756b83bc8544b04ed272781fcbc486061f8b37b4ec80b0f49
-
SSDEEP
3072:iyB9ME9JHdrngVBwmfw49VP3cHF+5rjDfeivhB7TwWuJIhZ2:eENrngfD4496ybmvIhZ2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 269298cb2dbcfdcf676b2b9a7a56f020_JaffaCakes118
Files
-
269298cb2dbcfdcf676b2b9a7a56f020_JaffaCakes118.exe windows:1 windows x86 arch:x86
6441e7ce88fdb6685ae523aed99cf1cc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetObjectA
GetBkColor
CreateCompatibleDC
CreateFontIndirectA
LineTo
GetStockObject
RectInRegion
CreateCompatibleBitmap
SelectObject
ExtTextOutA
StartPage
CreateRectRgn
SetBkMode
MoveToEx
GetTextExtentPoint32A
SetTextColor
EndDoc
CreateDIBSection
CreateRectRgnIndirect
SelectClipRgn
GetBkMode
CreateSolidBrush
Rectangle
GetDeviceCaps
SetBkColor
Polyline
SetTextAlign
SetROP2
EndPage
RestoreDC
SaveDC
CreatePen
DeleteDC
DeleteObject
GetTextMetricsA
msvcrt
_rotl
_safe_fprem1
wcscpy
__set_app_type
_fpreset
_gmtime64
_wfindnexti64
_endthread
_getdrive
_cprintf
iswlower
_wgetdcwd
_adj_fprem
_longjmpex
fseek
_fstati64
_outpd
_exit
_winminor
_mbsdup
_cexit
_ismbcl0
_i64toa
_memccpy
asctime
_findnext
_mbsncat
_aligned_malloc
isalpha
_wexecve
_snwprintf
_wstrtime
fwscanf
_spawnvpe
rand
_XcptFilter
iswprint
_ultow
memcpy
_utime64
_ctype
_initterm
_commode
_tell
_outp
_wfreopen
_acmdln
_mbsstr
wcscoll
_pgmptr
_memicmp
__p__commode
_futime
_tolower
_ismbbkalnum
isxdigit
freopen
strncmp
_wcsncoll
_global_unwind2
_safe_fdiv
sin
puts
_beginthread
_getmaxstdio
_mbscoll
_ftime64
fputwc
_mbctolower
_mkdir
_outpw
_ui64toa
_lock
_stricmp
_except_handler3
_mbsnbicoll
_heapchk
_wsearchenv
sqrt
__setusermatherr
_wtoi64
wcscmp
_wfullpath
_wstat
_spawnvp
fwprintf
_wexecle
isprint
strcpy
getchar
_wexeclp
_fsopen
_wfindnext
_wstati64
_setjmp
wcstoul
malloc
_mbsninc
__p__fmode
clock
exit
acos
strrchr
_chdrive
_heapadd
_mbsnbcat
_putch
_utime
_itow
iswspace
_adj_fdivr_m64
_mktemp
_ismbbpunct
_wcsdup
_spawnlpe
_spawnlp
_rotr
_adjust_fdiv
_wcreat
_ismbclower
_wsplitpath
_strnset
_controlfp
_logb
__getmainargs
user32
OffsetRect
IsDlgButtonChecked
DrawIconEx
FindWindowA
GetMenuItemCount
CheckDlgButton
SetFocus
OpenClipboard
EmptyClipboard
GetClientRect
KillTimer
EnableMenuItem
GetDlgItem
ExitWindowsEx
CheckRadioButton
IsWindowVisible
GetClassLongA
GetWindowThreadProcessId
SetWindowLongA
UpdateWindow
DefFrameProcA
IntersectRect
GetSubMenu
FillRect
CreateMenu
SetTimer
TranslateAcceleratorA
GetDesktopWindow
SetCursor
FindWindowExA
UnionRect
SetDlgItemTextA
LoadIconA
LoadCursorA
SetCapture
DestroyWindow
SendMessageA
InflateRect
GetScrollInfo
InvalidateRgn
DefWindowProcA
GetMenu
DrawEdge
DestroyIcon
GetWindowPlacement
CreateWindowExA
MapWindowPoints
DrawMenuBar
BeginDeferWindowPos
GetMenuItemID
GetWindowLongA
GetPropA
LoadStringA
SetWindowPos
DrawTextA
ClientToScreen
InsertMenuA
CheckMenuRadioItem
SetWindowPlacement
EnumChildWindows
GetKeyState
MoveWindow
GetSystemMetrics
DeferWindowPos
GetDoubleClickTime
SetPropA
ShowWindowAsync
RemoveMenu
SystemParametersInfoA
SetClipboardData
DialogBoxIndirectParamA
kernel32
TerminateThread
VirtualFree
GlobalLock
GetEnvironmentVariableA
InitializeCriticalSection
LCMapStringA
GetProcessHeap
ExitThread
GetSystemTimeAsFileTime
TlsSetValue
InterlockedIncrement
GetEnvironmentStringsW
ReadProcessMemory
GetCurrentProcess
FlushFileBuffers
GetProcAddress
GetProcessWorkingSetSize
WriteConsoleA
IsDebuggerPresent
GetModuleHandleA
ReadFile
FindResourceA
GetACP
SetStdHandle
CreateEventA
CloseHandle
GetCurrentThread
Module32First
WriteFile
GetVersionExA
DeleteCriticalSection
LoadResource
WaitForMultipleObjects
GetDriveTypeA
FileTimeToSystemTime
GetLocaleInfoA
GetLastError
GetConsoleMode
LocalFree
VirtualQueryEx
HeapReAlloc
InterlockedExchange
PulseEvent
SetLastError
GetTimeFormatA
IsValidCodePage
SetProcessWorkingSetSize
SetUnhandledExceptionFilter
FormatMessageA
FindClose
LeaveCriticalSection
ExitProcess
HeapFree
SetPriorityClass
UnmapViewOfFile
DuplicateHandle
GlobalMemoryStatus
GetStartupInfoA
CreateToolhelp32Snapshot
GetSystemDirectoryA
SetEnvironmentVariableA
WideCharToMultiByte
WaitForSingleObject
TlsAlloc
TlsFree
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ