Static task
static1
Behavioral task
behavioral1
Sample
250951e609ac537a2fc6b68ff4d6eb42_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
250951e609ac537a2fc6b68ff4d6eb42_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
250951e609ac537a2fc6b68ff4d6eb42_JaffaCakes118
-
Size
145KB
-
MD5
250951e609ac537a2fc6b68ff4d6eb42
-
SHA1
d73106a7fd5c9e514ec0f18a7eab7f6ec25c1aef
-
SHA256
61cf5cef7776707c25d51ae96751c9069c02a4897cb4705c408be6247c28b1a8
-
SHA512
45c1db871870dcf4fb1c2272640a4ae8c95e2dc25266aa92e849e47af067a9470232bf2fb18b0418b3bc9467eb9831c6ec8e2913dc05908b26112e4e351901f5
-
SSDEEP
3072:FlEQVcV/u69WjLn/nfqfSJWCQ6yvwRWr1k3n6HET/xofE5pM+m:8QVCWcW3nfISJWCpyvaWr1k36HETxosk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 250951e609ac537a2fc6b68ff4d6eb42_JaffaCakes118
Files
-
250951e609ac537a2fc6b68ff4d6eb42_JaffaCakes118.exe windows:4 windows x86 arch:x86
d2f11ae86103e5effa6475dc94b41dc8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumCalendarInfoW
GetDiskFreeSpaceW
GetLocaleInfoA
OpenWaitableTimerA
FindAtomA
FileTimeToDosDateTime
GetTempPathA
lstrcpynA
OpenSemaphoreW
GetCurrentDirectoryW
GetFileAttributesW
GetWindowsDirectoryW
TlsAlloc
QueryPerformanceCounter
CreateEventW
CreateDirectoryW
FindAtomW
ReadDirectoryChangesW
GetEnvironmentVariableW
OpenMutexA
LoadResource
GetFullPathNameA
GetFullPathNameW
lstrcmpA
GetVolumeInformationA
GetTempFileNameW
CompareStringA
GetAtomNameA
CreateSemaphoreW
AddAtomW
EndUpdateResourceA
EnumTimeFormatsA
GetACP
GetProcAddress
CreateMailslotW
OpenProcess
ConnectNamedPipe
lstrcmp
GetCPInfo
Beep
user32
GetDlgItem
UnregisterClassA
LoadMenuA
wsprintfA
InsertMenuA
MoveWindow
GetKeyboardType
AppendMenuW
LoadCursorA
DrawTextA
CopyIcon
DeleteMenu
IsWindowEnabled
ArrangeIconicWindows
PostQuitMessage
SetDlgItemTextW
GetDC
LoadImageW
SetTimer
CloseWindow
GetSubMenu
RegisterClassA
DefFrameProcW
PeekMessageW
SetDlgItemInt
TrackPopupMenu
wvsprintfW
EnumClipboardFormats
ReleaseDC
LoadCursorW
EnumDesktopsW
GetClassNameW
ClientToScreen
GetMenuState
GetCapture
DestroyWindow
UpdateLayeredWindow
EnableMenuItem
DialogBoxParamW
ActivateKeyboardLayout
EmptyClipboard
GetDlgItemTextW
GetKeyState
GetDesktopWindow
GetMenuInfo
LoadIconA
gdi32
RoundRect
GetPolyFillMode
StartDocA
RemoveFontResourceExA
GetBkColor
CopyEnhMetaFileA
GetNearestColor
DPtoLP
GetLayout
EnumObjects
EnumEnhMetaFile
CreateRoundRectRgn
GetMapMode
FillRgn
ResetDCW
SetDCBrushColor
advapi32
RegCreateKeyExW
RegCreateKeyA
RegOpenKeyA
RegDeleteValueW
RegOpenKeyExA
shell32
SHGetFileInfoA
shlwapi
SHGetValueA
oleaut32
VariantChangeTypeEx
SafeArrayGetDim
VarDecFromI2
VarBstrFromBool
VarR8FromBool
opengl32
glVertex3iv
glRasterPos4d
glVertex3i
glFogfv
wglGetProcAddress
glRasterPos2dv
glIndexPointer
glNormal3dv
glTexEnvfv
glPopName
glTexCoord4iv
glVertex3dv
glTexCoord4s
glIndexub
urlmon
CompareSecurityIds
CreateAsyncBindCtxEx
GetMarkOfTheWeb
CreateFormatEnumerator
URLDownloadW
CDLGetLongPathNameA
URLDownloadToCacheFileA
CoInternetGetSecurityUrl
URLOpenPullStreamW
PrivateCoInstall
URLDownloadToCacheFileW
winmm
waveOutGetPitch
sqlunirl
_MessageBoxEx_@20
_CreateMailslot_@16
_VkKeyScanEx_@8
_GetCurrentHwProfile_@4
_GetWindowTextLength@4
_IsCharLower_@4
_CreateStatusWindow_@16
_RemoveFontResource_@4
_GetVolumeInformation_@32
_ClearEventLog_@8
_RegCreateKeyEx_@36
_WriteConsoleInput_@16
_QueryServiceConfig_@16
_GetClassInfo@12
newMultiByteFromWideCharSize
_CommDlg_OpenSave_GetSpec@12
_CharToOem_@8
_LoadImage_@24
_GetCommandLine_@0
_RegisterClassEx_@4
_GetModuleFileName@12
wsock32
accept
WSASetBlockingHook
GetAddressByNameA
getsockname
GetTypeByNameW
inet_addr
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itcOXE Size: 512B - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gX Size: 1024B - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wXjPSi Size: 1KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qItkO Size: 5KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.iSoDRS Size: 2KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CA Size: 2KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aS Size: 2KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kVa Size: 2KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fAa Size: 1KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uD Size: 1024B - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 229KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ