Static task
static1
Behavioral task
behavioral1
Sample
2b3baf39949adfa9c0df6046683d6f87_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2b3baf39949adfa9c0df6046683d6f87_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2b3baf39949adfa9c0df6046683d6f87_JaffaCakes118
-
Size
173KB
-
MD5
2b3baf39949adfa9c0df6046683d6f87
-
SHA1
95abd782fb084041aeaddfc7e2e9a71514b71610
-
SHA256
d0a503e30fee7daf8d97984a0383ec6a8778fc351ba1847a474d088941f20b64
-
SHA512
dde17c9171770424a048b30c5daba8f661985153eaf907bdf504cd31e4cef80a394200d9beb8cc804c793f4f80eea3a49a71178db0f6b431f4f2ec875a35545e
-
SSDEEP
3072:1Dqtc5/DepDE3QhBejmH5Ts3ZXH4kBqjAip5hn2IWAFCO5JY0d9NJyIlV3LE41xv:1DqtcNeDE3QhBeoMXwjAuhn2IWAFCYYm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b3baf39949adfa9c0df6046683d6f87_JaffaCakes118
Files
-
2b3baf39949adfa9c0df6046683d6f87_JaffaCakes118.exe windows:4 windows x86 arch:x86
a69de5c55ee1ba2e6dd48b54400d89d0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatW
GetCommandLineA
GetCommandLineW
GetPrivateProfileStringA
GetPrivateProfileStringW
WritePrivateProfileStringA
WritePrivateProfileStringW
FindClose
FindFirstFileA
FindFirstFileW
GetModuleFileNameA
GetModuleFileNameW
GetFullPathNameA
GetFullPathNameW
CreateFileA
CreateFileW
ReadFile
WriteFile
HeapAlloc
lstrcatA
CreateProcessA
CreateProcessW
GetCurrentThreadId
WideCharToMultiByte
GetPrivateProfileStructA
GetPrivateProfileStructW
WritePrivateProfileStructA
WritePrivateProfileStructW
SetFilePointer
FindNextFileA
FindNextFileW
ExpandEnvironmentStringsA
ExpandEnvironmentStringsW
GetFileTime
SetFileTime
SetFileAttributesA
GetFileAttributesA
SetFileAttributesW
GetFileAttributesW
lstrlenW
MultiByteToWideChar
GetCurrentDirectoryW
GetCurrentDirectoryA
GlobalLock
GlobalUnlock
lstrlenA
lstrcmpW
lstrcmpA
GetProcessHeap
GetWindowsDirectoryW
GetACP
GetOEMCP
GetUserDefaultLangID
GetLocaleInfoW
GetLocaleInfoA
GetModuleHandleA
GetStartupInfoA
CreateMutexA
GetLastError
WaitForSingleObject
GetProcAddress
lstrcpynA
LoadLibraryA
GetModuleHandleW
GetStartupInfoW
lstrcpynW
LoadLibraryW
FreeLibrary
SetCurrentDirectoryW
SearchPathW
lstrcpyW
lstrcmpiW
MulDiv
ReleaseMutex
CloseHandle
SetCurrentDirectoryA
SearchPathA
lstrcpyA
lstrcmpiA
CompareFileTime
ExitProcess
GlobalFree
HeapFree
GlobalAlloc
user32
SetClassLongW
GetClassLongW
CreateWindowExW
GetClassLongA
TranslateAcceleratorW
IsDialogMessageW
GetMessageW
RegisterClassW
FindWindowW
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
IsDialogMessageA
GetMessageA
UpdateWindow
RegisterClassA
LoadCursorA
FindWindowA
GetClassNameA
GetClassNameW
CloseClipboard
SetClipboardData
EmptyClipboard
GetClipboardData
OpenClipboard
ShowScrollBar
SetWindowPos
CharUpperA
CharUpperW
GetKeyNameTextA
MapVirtualKeyA
GetKeyNameTextW
MapVirtualKeyW
UnhookWindowsHookEx
EndDialog
SetDlgItemTextA
SetDlgItemTextW
ActivateKeyboardLayout
GetKeyboardLayout
GetFocus
ReleaseDC
GetDC
GetKeyState
SetForegroundWindow
MoveWindow
GetWindow
LoadMenuA
LoadMenuW
LoadAcceleratorsA
LoadAcceleratorsW
LoadIconA
LoadIconW
LoadImageA
LoadImageW
LoadStringA
LoadStringW
CreateDialogParamA
CreateDialogParamW
DialogBoxParamA
DialogBoxParamW
EnumThreadWindows
WaitForInputIdle
SetWindowsHookExA
GetWindowTextLengthA
GetWindowLongW
GetDlgItemInt
SetDlgItemInt
InsertMenuA
ModifyMenuA
InsertMenuW
ModifyMenuW
EnableWindow
SetWindowTextA
SetWindowTextW
GetCursorPos
DrawTextExA
DrawTextExW
IsCharLowerW
CharLowerW
CharLowerBuffW
CharUpperBuffW
GetDlgItemTextA
GetDlgItemTextW
IsCharLowerA
CharLowerA
CharLowerBuffA
CharUpperBuffA
FindWindowExA
FindWindowExW
ShowCaret
HideCaret
SetClassLongA
GetSystemMetrics
GetSysColor
ShowWindow
GetMenuStringA
DefFrameProcA
DestroyAcceleratorTable
DestroyMenu
PostQuitMessage
GetWindowRect
GetSystemMenu
CreateMDIWindowW
CreateMDIWindowA
DestroyWindow
DestroyIcon
CallWindowProcW
SendMessageW
DefWindowProcW
CallWindowProcA
MessageBeep
SystemParametersInfoA
GetScrollInfo
DefWindowProcA
wsprintfW
MessageBoxW
PostMessageW
GetWindowTextW
DefMDIChildProcW
EnableMenuItem
SetFocus
wsprintfA
MessageBoxA
PostMessageA
ClientToScreen
TrackPopupMenu
GetParent
GetWindowLongA
SetWindowLongW
GetMenuStringW
DefFrameProcW
GetSubMenu
DeleteMenu
DrawMenuBar
CreateWindowExA
GetWindowTextLengthW
GetClientRect
SetWindowLongA
InvalidateRect
GetDlgItem
CheckMenuItem
GetWindowTextA
DefMDIChildProcA
SendMessageA
DispatchMessageW
gdi32
StartDocW
GetTextMetricsW
StartDocA
GetTextMetricsA
StartPage
EndPage
EndDoc
DeleteDC
CreateFontIndirectW
GetCharWidthW
CreateFontIndirectA
SelectObject
GetCharWidthA
GetDeviceCaps
DeleteObject
GetObjectW
GetObjectA
GetStockObject
advapi32
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegSetValueExW
RegDeleteKeyW
RegEnumKeyExW
RegDeleteKeyA
RegEnumKeyExA
RegEnumValueW
RegDeleteValueW
RegEnumValueA
RegDeleteValueA
RegCreateKeyExW
RegSetValueExA
shell32
SHGetMalloc
DragAcceptFiles
DragQueryFileW
DragQueryFileA
DragFinish
ShellExecuteW
ShellExecuteA
SHChangeNotify
comctl32
ImageList_SetBkColor
ImageList_Create
ord17
PropertySheetA
ImageList_Destroy
ImageList_ReplaceIcon
PropertySheetW
comdlg32
GetOpenFileNameW
GetSaveFileNameA
GetOpenFileNameA
ChooseFontA
ChooseFontW
PrintDlgW
PrintDlgA
ChooseColorW
ChooseColorA
PageSetupDlgW
GetSaveFileNameW
PageSetupDlgA
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeW
ole32
ReleaseStgMedium
Sections
.text Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.drdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE