Static task
static1
Behavioral task
behavioral1
Sample
2529443784e383369e831aae83ea1223_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2529443784e383369e831aae83ea1223_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
2529443784e383369e831aae83ea1223_JaffaCakes118
-
Size
343KB
-
MD5
2529443784e383369e831aae83ea1223
-
SHA1
f8c9af2de99254db64d759b73fffc4f93e6138e9
-
SHA256
6e5e0dd73a07c86210ff7acf0176531b9ead3feb8b4f1d838eae89b44b5fed64
-
SHA512
93e5f5c195e880374677077bf79064389a0644e5f33673aefc32aa55adb17a2fc6791ea548c1d1e87718f2bacabe322b3b9ad543868221f89faf1bf1a9838723
-
SSDEEP
6144:oIeo6k7b+q4TicAjQY0nR4wj6xwVKeEqpUUhXGF0GuIplteCe8B+/V:7eS7yq+71YyvOwLUQmKI7cCeb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2529443784e383369e831aae83ea1223_JaffaCakes118
Files
-
2529443784e383369e831aae83ea1223_JaffaCakes118.exe windows:1 windows x86 arch:x86
083d26fe7588c73191a0d01ccb8a6bd3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
BeginPath
SetPixel
Arc
GetPath
RealizePalette
SetBkMode
StretchBlt
SetPixelFormat
SelectObject
GetTextColor
CreatePen
GetRgnBox
RectVisible
SelectPalette
CreateSolidBrush
SetViewportExtEx
SetBkColor
SetTextColor
GetSystemPaletteEntries
FillRgn
DeleteObject
SetWorldTransform
SetMapMode
GetBkMode
CreateFontA
ArcTo
BitBlt
GetDIBits
AnimatePalette
GetTextMetricsA
PaintRgn
GetWindowOrgEx
GetObjectA
GetWindowExtEx
CreateDCA
UnrealizeObject
SetViewportOrgEx
TextOutA
SaveDC
SetDIBitsToDevice
Rectangle
FillPath
CreateDIBitmap
UpdateColors
PolyDraw
FrameRgn
GetBkColor
Ellipse
advapi32
RegOpenKeyExA
RegConnectRegistryA
RegOpenKeyA
wsock32
getsockname
connect
sendto
bind
listen
WSACleanup
recvfrom
ntohs
gethostbyname
getpeername
gethostname
ntohl
shutdown
gethostbyaddr
send
htons
inet_ntoa
htonl
accept
closesocket
WSAStartup
setsockopt
WSAGetLastError
recv
socket
user32
UpdateWindow
IsWindow
PtInRect
ShowCursor
CallMsgFilterA
ShowWindow
GetActiveWindow
SetScrollRange
FillRect
GetSystemMetrics
ExitWindowsEx
MoveWindow
SendMessageA
KillTimer
UnregisterClassA
EnableMenuItem
EnumChildWindows
CreateWindowExA
EnumDesktopWindows
SetRect
ScrollWindowEx
ReleaseDC
DeleteMenu
ClientToScreen
SetTimer
FrameRect
AttachThreadInput
EnumThreadWindows
SetWindowPos
ShowOwnedPopups
EndPaint
CopyRect
DispatchMessageA
CharUpperA
GetMenu
kernel32
lstrcmpi
ExitProcess
SetEndOfFile
GetCurrentProcess
MapViewOfFile
FindResourceA
LoadResource
GetCurrentThread
SizeofResource
InterlockedIncrement
LocalAlloc
PurgeComm
LocalFree
TlsAlloc
VirtualProtectEx
LoadLibraryA
GetProcAddress
CreateSemaphoreA
GetModuleHandleA
AllocConsole
DeleteFileA
GetTickCount
OpenFileMappingA
SetConsoleTitleA
DosDateTimeToFileTime
WriteConsoleOutputA
GetCommState
ExitThread
GetSystemTime
GetFileSize
WaitForMultipleObjects
CreateConsoleScreenBuffer
GlobalHandle
OpenEventA
ReadConsoleInputA
SetConsoleCP
SetLocalTime
LoadModule
SetConsoleCursorPosition
CreateFileMappingA
TlsFree
SetThreadPriority
GlobalLock
CreatePipe
GetFileAttributesA
SystemTimeToFileTime
ReadConsoleOutputA
FindNextFileA
CreateNamedPipeA
CreateEventA
ReleaseMutex
ResumeThread
ResetEvent
GetSystemInfo
ReadConsoleA
UnmapViewOfFile
TlsGetValue
GetLastError
FileTimeToDosDateTime
CreateMutexA
GetFileTime
GetNamedPipeInfo
InitializeCriticalSection
UnlockFile
ClearCommError
TerminateProcess
DisconnectNamedPipe
GetConsoleTitleA
GetTempPathA
SetStdHandle
FindFirstFileA
WriteConsoleA
WriteConsoleInputA
SetFilePointer
GetDriveTypeA
SuspendThread
GetCommandLineA
GetWindowsDirectoryA
DuplicateHandle
CloseHandle
LocalReAlloc
GetEnvironmentStringsA
GetCommMask
FindResourceExA
SetEvent
SetFileAttributesA
LockFile
GetConsoleOutputCP
GetExitCodeThread
GlobalReAlloc
GetCurrencyFormatA
WriteFile
TerminateThread
SetConsoleCtrlHandler
GetSystemDirectoryA
GetFileType
WaitForSingleObject
LeaveCriticalSection
GetConsoleCP
GetCPInfo
GetDiskFreeSpaceA
GetLogicalDrives
WaitCommEvent
Sections
AUTO Size: 8KB - Virtual size:
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: 8KB - Virtual size:
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DGROUP Size: 10KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 314KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ