Static task
static1
Behavioral task
behavioral1
Sample
2882d55402f205b71326db97699043aa_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2882d55402f205b71326db97699043aa_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2882d55402f205b71326db97699043aa_JaffaCakes118
-
Size
194KB
-
MD5
2882d55402f205b71326db97699043aa
-
SHA1
a6a7249cc0f64e05908126abe6365ddf8c7ead07
-
SHA256
da9cc677b051975a9e1b60b4f32419caaa77f5f205a0e3847993b9f77a0c7563
-
SHA512
fa6f2003c2f5d019dd12cde33cde08152a7c016a677d9e05c9b5e476d2ba69960150de663f1b1e3b5d149b0917b9f63fa87c6400cf30d96b5ceb0d2ac3b641f4
-
SSDEEP
3072:dzRsqoEx/pMomc61C49P7qoAK810hFD7Zi2EJdmDkJfVcJE+o0LVxVru1:dF4+6HNTEnD5aJJLVHy1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2882d55402f205b71326db97699043aa_JaffaCakes118
Files
-
2882d55402f205b71326db97699043aa_JaffaCakes118.exe windows:1 windows x86 arch:x86
a5554e1c96d92ef15112c50d6b1a41bd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
OemToCharA
LoadBitmapA
ReleaseDC
GetWindowRect
GetClassNameA
BeginPaint
GetDC
EndPaint
SetWindowTextA
CharUpperA
CharLowerA
CreateDialogParamA
GetClientRect
SendMessageA
InvalidateRect
GetDlgItem
GetWindowTextA
EnableWindow
IsWindowVisible
SetFocus
ScreenToClient
CharNextA
InflateRect
SetRectEmpty
GetSystemMetrics
SetWindowPos
UpdateWindow
ShowWindow
DestroyWindow
wsprintfA
LoadStringA
MessageBeep
MessageBoxA
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
SetTimer
PeekMessageA
IsWindow
IsDialogMessageA
TranslateMessage
DispatchMessageA
KillTimer
SetRect
FillRect
CharToOemA
CharPrevA
PostQuitMessage
DefWindowProcA
ExitWindowsEx
FindWindowA
PostMessageA
RegisterWindowMessageA
DdeGetData
DdeFreeDataHandle
DdeConnect
DdeClientTransaction
DdeGetLastError
DdeDisconnect
DdeFreeStringHandle
DdeUninitialize
DdeInitializeA
DdeCreateStringHandleA
GetClassInfoA
GetWindowLongA
GetWindow
GetSysColor
gdi32
SetPixel
GetTextExtentPointA
DeleteObject
GetSystemPaletteEntries
CreatePalette
CreateDIBitmap
CreateBitmap
SetBkColor
CreatePen
MoveToEx
LineTo
CreateCompatibleBitmap
SaveDC
CreateSolidBrush
GetStockObject
Rectangle
RestoreDC
GetDeviceCaps
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
SelectPalette
RealizePalette
GetObjectA
kernel32
OpenFile
FindClose
GetFileTime
SetFileTime
GetStdHandle
GetCPInfo
GetOEMCP
GetACP
UnhandledExceptionFilter
RtlUnwind
ExitProcess
GetLocalTime
GetCommandLineA
GetEnvironmentStrings
GetStartupInfoA
GlobalHandle
GlobalCompact
GlobalReAlloc
GetCurrentDirectoryA
_llseek
FileTimeToDosDateTime
FileTimeToLocalFileTime
GetFileType
VirtualFree
GetModuleHandleA
WideCharToMultiByte
GetSystemInfo
GetTimeZoneInformation
SetEnvironmentVariableA
MultiByteToWideChar
WinExec
MoveFileExA
GetCurrentThread
GetCurrentProcess
lstrcmpA
CreateDirectoryA
GetDiskFreeSpaceA
GetLastError
FindNextFileA
SetCurrentDirectoryA
GetDriveTypeA
SetFileAttributesA
GetFileAttributesA
RemoveDirectoryA
GetTickCount
GetModuleFileNameA
lstrcpyA
IsDBCSLeadByte
FreeLibrary
GetProcAddress
LoadLibraryA
GetVersion
GlobalFree
GlobalUnlock
FreeResource
_lclose
_hwrite
CreateFileA
lstrcatA
GetWindowsDirectoryA
GlobalLock
GlobalAlloc
LockResource
SizeofResource
LoadResource
FindResourceA
_lread
LocalFileTimeToFileTime
SetErrorMode
lstrcmpiA
GetPrivateProfileStringA
lstrlenA
Sleep
GetSystemDirectoryA
FindFirstFileA
VirtualAlloc
CloseHandle
_lwrite
GetFileSize
SetEndOfFile
DosDateTimeToFileTime
SetFilePointer
ReadFile
WriteFile
DeleteFileA
MoveFileA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
advapi32
RegDeleteValueA
RegCloseKey
RegQueryValueExA
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenThreadToken
OpenProcessToken
GetTokenInformation
EqualSid
RegEnumValueA
RegOpenKeyA
InitializeSecurityDescriptor
RegSetValueExA
RegEnumKeyA
RegDeleteKeyA
RegCreateKeyExA
AllocateAndInitializeSid
SetSecurityDescriptorOwner
FreeSid
comdlg32
GetSaveFileNameA
GetOpenFileNameA
Sections
.text Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 145KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ