Static task
static1
Behavioral task
behavioral1
Sample
32bf2c5fb85137cd8578f0867502b5e3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
32bf2c5fb85137cd8578f0867502b5e3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
32bf2c5fb85137cd8578f0867502b5e3_JaffaCakes118
-
Size
292KB
-
MD5
32bf2c5fb85137cd8578f0867502b5e3
-
SHA1
4c153b96e4153d52d5704b199b6bfb4f71c481dd
-
SHA256
57c489129a5c83fb97327ca001a619b3ba2f77a5a892ea218e9bce287930008e
-
SHA512
98bd5c6876aa4886ee81f340f76c8e5cb2a72b08d7cdf83e1e638484ab4eaa27df5bdbffd1f3dd0791521c6811ce240273b3f37e772fa5220167aa0033ad1947
-
SSDEEP
6144:dPY+6jAfybh+ek4on64C58lHdYCzliVXYHdZ5FZAyg1:xYzhTk4o65E2CzDHDZu1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 32bf2c5fb85137cd8578f0867502b5e3_JaffaCakes118
Files
-
32bf2c5fb85137cd8578f0867502b5e3_JaffaCakes118.exe windows:4 windows x86 arch:x86
13e7828a80e53480ae99b09fd1108b91
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumTimeFormatsA
GetConsoleOutputCP
SetHandleInformation
GetNumberFormatA
GetStdHandle
FlushConsoleInputBuffer
GetPrivateProfileStringA
ReadConsoleInputA
SetPriorityClass
GetConsoleFontSize
GetProfileIntA
ReadConsoleOutputCharacterA
GetModuleHandleA
TermsrvAppInstallMode
FileTimeToSystemTime
ReadConsoleA
GetConsoleCommandHistoryLengthA
LocalFileTimeToFileTime
IsBadHugeReadPtr
GlobalHandle
HeapSize
GetConsoleWindow
SetConsoleOutputCP
GetUserDefaultLCID
OpenJobObjectA
GetFullPathNameA
GetVersion
GetStringTypeExA
GetProcAddress
OutputDebugStringA
GetProcessTimes
Toolhelp32ReadProcessMemory
GetStartupInfoA
GetCommMask
GetNamedPipeHandleStateA
IsBadReadPtr
EndUpdateResourceA
IsBadCodePtr
LocalLock
GetDiskFreeSpaceA
HeapReAlloc
VirtualAllocEx
GetConsoleTitleA
WriteConsoleOutputCharacterW
SetThreadAffinityMask
AddConsoleAliasA
GetEnvironmentVariableA
FindNextVolumeMountPointA
SetConsoleMaximumWindowSize
SetConsoleDisplayMode
Heap32ListFirst
UnregisterConsoleIME
SetLocalPrimaryComputerNameA
HeapFree
IsBadCodePtr
MultiByteToWideChar
ExitProcess
BuildCommDCBAndTimeoutsW
IsBadStringPtrA
SetVolumeMountPointA
EnumResourceTypesA
SetVolumeLabelA
DefineDosDeviceA
CreateDirectoryExW
PostQueuedCompletionStatus
GetFileAttributesExA
EscapeCommFunction
GetEnvironmentVariableA
LockFile
FindFirstVolumeMountPointA
GetConsoleOutputCP
GetConsoleAliasesA
OpenMutexA
RaiseException
GetCurrentDirectoryA
GetCommState
SetConsoleNumberOfCommandsA
SetEvent
GetProcessId
OpenProcess
CreateEventA
GetTickCount
Module32First
ReadConsoleA
SetTimeZoneInformation
SetComputerNameExA
GetLocalTime
FlushFileBuffers
LocalCompact
SetInformationJobObject
winmm
timeGetSystemTime
user32
CopyImage
LoadMenuIndirectA
CharLowerBuffA
PostThreadMessageA
IsGUIThread
ClientToScreen
SetClassWord
DrawStateA
AdjustWindowRect
GetForegroundWindow
GetWindowTextLengthA
DefDlgProcA
DestroyAcceleratorTable
DestroyCursor
UnhookWindowsHookEx
DrawCaptionTempA
DragObject
SetClipboardData
CreateWindowExA
KillTimer
CreateWindowStationA
TileChildWindows
GetWindowTextA
DrawEdge
PostThreadMessageA
GetSystemMetrics
EnumPropsA
SetForegroundWindow
PeekMessageA
SetPropA
InvalidateRgn
SetParent
ScrollChildren
CreateWindowStationA
EndPaint
SetCursorPos
OemToCharBuffA
SetParent
FreeDDElParam
ShowWindowAsync
EndDeferWindowPos
GetCaretBlinkTime
CharNextExA
IsWinEventHookInstalled
GetCaretBlinkTime
GetSysColorBrush
UnregisterHotKey
GetDlgItemTextA
GetWindowTextLengthW
SetThreadDesktop
KillTimer
DefDlgProcA
CharUpperBuffA
ReuseDDElParam
CalcMenuBar
CallWindowProcA
EndTask
CharUpperBuffW
DisplayExitWindowsWarnings
RegisterClipboardFormatA
CharNextExA
UnionRect
DefDlgProcA
RegisterHotKey
FindWindowExA
ReasonCodeNeedsBugID
EnumDesktopsA
ReplyMessage
GetUpdateRgn
ShowScrollBar
SendMessageTimeoutW
DlgDirSelectExA
GetKeyState
SetDlgItemInt
GetClipboardData
DrawIconEx
GetInputDesktop
GetNextDlgGroupItem
TranslateAcceleratorA
RegisterTasklist
MenuItemFromPoint
CreateDialogParamA
Sections
.idata Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.itext Size: 276KB - Virtual size: 279KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ