Static task
static1
Behavioral task
behavioral1
Sample
2bc490259f4c81971ff82e5d2f345fd3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2bc490259f4c81971ff82e5d2f345fd3_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2bc490259f4c81971ff82e5d2f345fd3_JaffaCakes118
-
Size
526KB
-
MD5
2bc490259f4c81971ff82e5d2f345fd3
-
SHA1
5512a9e050070ce1ae271b90d7db072dcab4c99e
-
SHA256
768fcb292c51547f6856833c8033cff9c8ea3e243a1e3d03413be442e70be2f9
-
SHA512
2636dbcba0fb5419652ac0cbf5344f897625de03b4cfe67df6a18d0b0135da40c52808464f9d8f9eb3c0bad2bbfeb3bed18a78abd211423af026d15d4712f51a
-
SSDEEP
12288:wf4Ev/Fc27obuf4Vl9ks3563M1B2k5Oh7EvpJVV2Vi1qAjK:wfHv/Sjuf4Vlec6aB24OdgVII5+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2bc490259f4c81971ff82e5d2f345fd3_JaffaCakes118
Files
-
2bc490259f4c81971ff82e5d2f345fd3_JaffaCakes118.exe windows:4 windows x86 arch:x86
779b3134d7341a6666034373815f7408
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyA
avifil32
AVIStreamGetFrameOpen
AVIStreamTimeToSample
AVIStreamGetFrame
AVIStreamInfoA
AVIStreamRelease
AVIStreamSampleToTime
AVIStreamLength
AVIStreamOpenFromFileA
AVIFileRelease
AVIStreamWrite
AVIStreamSetFormat
AVIMakeCompressedStream
AVIFileCreateStreamA
AVIStreamGetFrameClose
AVIFileOpenA
comctl32
ord17
ddraw
DirectDrawCreate
dsound
ord1
gdi32
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
GetStockObject
DeleteObject
GetObjectA
SetSystemPaletteUse
CreateSolidBrush
CreatePen
SelectObject
TextOutA
SetBkMode
SetTextColor
PtVisible
RectVisible
ExtTextOutA
Escape
SetViewportOrgEx
SetMapMode
RestoreDC
SaveDC
DeleteDC
GetDeviceCaps
SetBkColor
StretchBlt
GetClipBox
CreateBitmap
kernel32
TerminateThread
CloseHandle
SetThreadPriority
CreateThread
FindResourceA
SizeofResource
LoadResource
LockResource
FreeResource
GetProcAddress
GetModuleHandleA
SetCurrentDirectoryA
lstrlenA
GetCurrentDirectoryA
QueryPerformanceCounter
SetLastError
GetLastError
lstrcpynA
GetModuleFileNameA
Sleep
LocalFree
InitializeCriticalSection
TlsAlloc
DeleteCriticalSection
GlobalFree
GlobalUnlock
GlobalHandle
LeaveCriticalSection
GlobalLock
GlobalReAlloc
GlobalAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
InterlockedDecrement
GetVersion
InterlockedIncrement
WideCharToMultiByte
MultiByteToWideChar
GetCurrentThreadId
lstrcpyA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
lstrcatA
FreeLibrary
LoadLibraryA
GetProcessVersion
lstrcmpA
GlobalFlags
GetCPInfo
GetOEMCP
GetCurrentProcess
CreateFileA
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
DeleteFileA
FindClose
FindFirstFileA
GetFullPathNameA
GetFileAttributesA
FileTimeToSystemTime
FileTimeToLocalFileTime
RtlUnwind
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetSystemTimeAsFileTime
ExitProcess
TerminateProcess
FindNextFileA
GetStartupInfoA
GetCommandLineA
SetHandleCount
GetStdHandle
GetFileType
RaiseException
HeapSize
HeapReAlloc
GetACP
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetDriveTypeA
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetStdHandle
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
GetCurrentProcessId
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
WritePrivateProfileStringA
LocalAlloc
GetPrivateProfileStringA
shell32
ShellExecuteA
user32
SetWindowsHookExA
CallNextHookEx
GetKeyState
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetWindowPos
GetWindow
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
GetDlgCtrlID
GetMenuItemID
GetSubMenu
GetMenuItemCount
GetMenu
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
GetSysColorBrush
GetClassNameA
PtInRect
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetLastActivePopup
IsWindowEnabled
EnableWindow
LoadStringA
SetCursorPos
ClientToScreen
GetClientRect
ShowCursor
SetWindowTextA
MoveWindow
GetSystemMetrics
GetWindowRect
DefWindowProcA
UnhookWindowsHookEx
GetWindowLongA
FillRect
MessageBoxA
GetDC
PostMessageA
ReleaseDC
AdjustWindowRect
SetWindowLongA
LoadImageA
DialogBoxParamA
GetDlgItem
GetWindowTextA
EndDialog
FindWindowA
ShowWindow
LoadIconA
RegisterClassA
CreateWindowExA
UpdateWindow
LoadCursorA
SetCursor
SendMessageA
PeekMessageA
TranslateMessage
DispatchMessageA
WaitMessage
DestroyWindow
UnregisterClassA
DestroyCursor
PostQuitMessage
GetParent
winmm
mmioDescend
mmioOpenA
mmioGetInfo
mmioSeek
mciGetErrorStringA
mciSendStringA
mmioRead
mmioClose
mmioAdvance
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
Sections
.text Size: 332KB - Virtual size: 336KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 45KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 115KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE