Static task
static1
Behavioral task
behavioral1
Sample
32e339e35a0036d502084778a08bda4d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
32e339e35a0036d502084778a08bda4d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
32e339e35a0036d502084778a08bda4d_JaffaCakes118
-
Size
102KB
-
MD5
32e339e35a0036d502084778a08bda4d
-
SHA1
039fd49ca824952aa0464dd95fc8a39db91cfda5
-
SHA256
a5a40e4c7eb5037712fc7dbedfa5e62bc1816d4297314f28f5fb481dffd23911
-
SHA512
4b225883995064e2c0b6dce951c98f57ed1dcc1cfb821c366264f1e6f9dca68d2a26764ca4d243b1f2b781ce048e06c74f2a3f6eee572ba828194b31b3b053a7
-
SSDEEP
1536:Qla2T8uOR09HN2GeJ0XTwV/kzlp5h3dcURzOhRll8OZU4:Ql2p0VN1ewY/kzlfhNIhPl8kU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 32e339e35a0036d502084778a08bda4d_JaffaCakes118
Files
-
32e339e35a0036d502084778a08bda4d_JaffaCakes118.exe windows:4 windows x86 arch:x86
d8885a9967a1c8afe45ad1183fa3238d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
wcscspn
sprintf
memmove
sin
advapi32
RegQueryValueExA
RegQueryValueA
RegOpenKeyA
shell32
SHGetFolderPathA
SHGetSpecialFolderLocation
user32
SetRect
GetKeyNameTextA
PeekMessageW
SetWindowLongA
GetIconInfo
SendMessageA
GetClassInfoA
GetWindowRect
CreateIcon
SetScrollRange
LoadStringA
DestroyIcon
DefFrameProcA
DefMDIChildProcA
SetFocus
MoveWindow
CharNextW
SystemParametersInfoA
PeekMessageA
IsDialogMessageW
GetMenu
GetParent
LoadIconA
RemoveMenu
DefWindowProcA
IsChild
SetTimer
GetWindowLongW
GetWindowDC
ReleaseDC
CharLowerA
ReleaseCapture
EnableMenuItem
ActivateKeyboardLayout
DrawIcon
SetForegroundWindow
GetClassLongA
CharToOemA
ScreenToClient
GetWindow
OpenClipboard
WaitMessage
MessageBoxA
OemToCharA
RemovePropA
DestroyMenu
GetClipboardData
InvalidateRect
SetCapture
CallNextHookEx
IsWindowVisible
GetActiveWindow
WindowFromPoint
MapWindowPoints
DrawFrameControl
GetCursorPos
GetScrollPos
GetPropA
GetTopWindow
GetMenuStringA
MsgWaitForMultipleObjects
TranslateMDISysAccel
LoadKeyboardLayoutA
GetScrollRange
GetSystemMetrics
GetWindowThreadProcessId
DrawAnimatedRects
SetClipboardData
SetMenuItemInfoA
MessageBeep
ClientToScreen
SetScrollInfo
DrawMenuBar
GetKeyboardLayout
UnhookWindowsHookEx
RegisterClassA
GetKeyboardType
IsWindow
SetClassLongA
GetMessagePos
DispatchMessageW
ShowScrollBar
CreateMenu
SetScrollPos
PostMessageA
InsertMenuA
FillRect
FindWindowA
DispatchMessageA
EnableWindow
CreatePopupMenu
SetPropA
CreateWindowExA
DrawEdge
GetForegroundWindow
GetClassNameA
GetDCEx
GetMenuItemID
GetWindowLongA
PostQuitMessage
GetMenuItemCount
ShowWindow
EnumWindows
CharLowerBuffA
IsDialogMessageA
GetMenuItemInfoA
IsWindowUnicode
CloseClipboard
DestroyWindow
GetMenuState
GetLastActivePopup
LoadCursorA
IsZoomed
RegisterClipboardFormatA
EnumThreadWindows
IsWindowEnabled
ScrollWindow
UpdateWindow
SetWindowsHookExA
GetKeyboardState
DrawIconEx
OffsetRect
ShowOwnedPopups
GetCapture
AdjustWindowRectEx
RegisterWindowMessageA
DrawTextA
SendMessageW
UnregisterClassA
IsRectEmpty
GetWindowPlacement
CharUpperBuffA
EqualRect
EnableScrollBar
SetActiveWindow
wsprintfA
MapVirtualKeyA
GetSystemMenu
SetCursor
DestroyCursor
GetCursor
GetKeyState
GetDC
BeginPaint
SetWindowTextA
LoadBitmapA
DeleteMenu
CheckMenuItem
InflateRect
KillTimer
GetKeyboardLayoutNameA
GetDesktopWindow
GetScrollInfo
EnumChildWindows
SetWindowLongW
GetWindowTextA
PtInRect
SetWindowPos
GetSysColor
InsertMenuItemA
SetParent
GetFocus
EndPaint
FrameRect
TranslateMessage
GetKeyboardLayoutList
SetWindowPlacement
TrackPopupMenu
GetClientRect
GetDlgItem
CallWindowProcA
oleaut32
VariantCopyInd
OleLoadPicture
kernel32
lstrcmpiA
ExitProcess
FindFirstFileA
VirtualAlloc
GetThreadLocale
GetStringTypeW
LoadLibraryA
GetCurrentThread
LoadResource
GetUserDefaultLCID
DeleteFileA
CreateEventA
GetLocalTime
HeapDestroy
HeapFree
SetLastError
lstrcatA
WideCharToMultiByte
lstrcmpA
CreateThread
GetCurrentThreadId
GetCPInfo
MulDiv
GetProcessHeap
GetProcAddress
LocalReAlloc
LocalFree
CreateFileA
HeapAlloc
GlobalAlloc
FindResourceA
SetEvent
GetDiskFreeSpaceA
GetTickCount
GlobalFindAtomA
ExitThread
GetLastError
VirtualQuery
GetFileSize
SetEndOfFile
EnterCriticalSection
VirtualFree
SetThreadLocale
lstrlenA
GetModuleFileNameA
EnumCalendarInfoA
RaiseException
GetFullPathNameA
Sleep
SizeofResource
GetEnvironmentStrings
LoadLibraryExA
MoveFileExA
SetErrorMode
WriteFile
GetCurrentProcessId
GetStdHandle
GetModuleHandleA
SetHandleCount
GetACP
GetDateFormatA
ReadFile
CompareStringA
GetCommandLineA
GetStartupInfoA
GetFileType
GetSystemDefaultLangID
LockResource
GetVersion
GetOEMCP
GetLocaleInfoA
GetFileAttributesA
GetVersionExA
InitializeCriticalSection
GlobalDeleteAtom
lstrcpynA
GetStringTypeA
ResetEvent
VirtualAllocEx
GetCurrentProcess
FreeResource
FreeLibrary
GlobalAddAtomA
SetFilePointer
FindClose
FormatMessageA
Sections
CODE Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 610B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ