Static task
static1
Behavioral task
behavioral1
Sample
2870e6b3c6bbe863b6b4f63132a8668f_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2870e6b3c6bbe863b6b4f63132a8668f_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2870e6b3c6bbe863b6b4f63132a8668f_JaffaCakes118
-
Size
798KB
-
MD5
2870e6b3c6bbe863b6b4f63132a8668f
-
SHA1
319c61db19905bdec592023c92e9afc5f29e382a
-
SHA256
7669f9009a04e0d5571b9d3350e82d0cf0ed68e10cc2c88edef0d26c3a1d96c0
-
SHA512
0ae978d1a1267c1648095e5899f5918aaa38a054fbd723778c6b5ec9869b35276dfbbc0dd1a225f64fa5695af3ad387405c2c74e1692ce590d41f80b7dd58bb2
-
SSDEEP
12288:1IfGKtyQlYBmF1OU7O0tvlqhuFsXMZVp1CGuAgpw/9/WJAfbpn7/ofp1S3H:1IfGElgDY3bFqMZf1C2gaF/QAJ1X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2870e6b3c6bbe863b6b4f63132a8668f_JaffaCakes118
Files
-
2870e6b3c6bbe863b6b4f63132a8668f_JaffaCakes118.exe windows:4 windows x86 arch:x86
8c13d859124f92779da9db05c3517c61
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetForegroundWindow
ReleaseDC
SetWindowPos
IsWindow
DispatchMessageA
GetDC
GetCursorPos
SendMessageA
GetClientRect
DestroyWindow
UpdateWindow
ShowWindow
EnableWindow
TranslateMessage
GetWindow
EnableMenuItem
RegisterClassA
GetSubMenu
CreateWindowExA
FillRect
SetFocus
PeekMessageA
BeginPaint
KillTimer
DefWindowProcA
GetSystemMetrics
GetWindowRect
ReleaseCapture
CheckMenuItem
SetTimer
GetDlgItem
ScreenToClient
EndDialog
SetDlgItemTextA
MessageBoxA
DialogBoxParamA
GetSysColor
IsWindowVisible
DrawTextA
CallWindowProcA
SetCursor
kernel32
GlobalFree
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
GetFileAttributesA
WaitForSingleObject
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
LocalAlloc
ExpandEnvironmentStringsA
SetErrorMode
FreeEnvironmentStringsW
SetStdHandle
GetTempPathA
WideCharToMultiByte
GetStringTypeA
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
SetEvent
LocalFree
InitializeCriticalSection
FindClose
TlsGetValue
FormatMessageA
SetLastError
GetSystemTime
lstrlenW
GetModuleFileNameW
IsDebuggerPresent
GetVersionExA
GetModuleFileNameA
LoadLibraryExA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
CreateThread
SetUnhandledExceptionFilter
GetTickCount
GetVersion
GetCurrentThreadId
GetCurrentThread
GetCommandLineA
GetCurrentProcessId
GetModuleHandleA
GetLastError
ExitProcess
VirtualAlloc
ResetEvent
GetOEMCP
Sleep
VirtualFree
FindResourceW
UnmapViewOfFile
IsValidCodePage
SizeofResource
InterlockedExchange
GetModuleHandleW
GetACP
lstrcpynA
CloseHandle
ReadFile
SetFilePointer
TlsFree
MapViewOfFile
RaiseException
InterlockedCompareExchange
HeapSize
GetCPInfo
GetCommandLineW
GetEnvironmentStrings
RemoveDirectoryA
GlobalUnlock
GetEnvironmentStringsW
GetThreadLocale
FindNextFileW
LCMapStringA
GetConsoleCP
lstrlenA
HeapCreate
LCMapStringW
InterlockedIncrement
HeapAlloc
CreateFileA
TlsSetValue
GetFileType
CreateEventA
CreateFileW
GetTimeZoneInformation
GetProcAddress
WaitForMultipleObjects
FindFirstFileW
CreateFileMappingA
CompareStringA
FindFirstFileA
CompareStringW
GlobalLock
DeleteFileW
DeleteFileA
CreateDirectoryA
GetFileSize
GetStartupInfoA
LoadLibraryA
FlushFileBuffers
TlsAlloc
QueryPerformanceCounter
FreeLibrary
SetHandleCount
EnterCriticalSection
HeapFree
WriteConsoleW
LeaveCriticalSection
SetEndOfFile
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
GetSystemDirectoryA
Sections
.text Size: 761KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ