Static task
static1
Behavioral task
behavioral1
Sample
335355d0cf79e921eb4fc0809e2418fd_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
335355d0cf79e921eb4fc0809e2418fd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
335355d0cf79e921eb4fc0809e2418fd_JaffaCakes118
-
Size
716KB
-
MD5
335355d0cf79e921eb4fc0809e2418fd
-
SHA1
f119bee477a3fcb22be8cb822bada3c4cf10c804
-
SHA256
ca7fb5932458a0eff603c7bd8bab70406bfa61ee5c7164cc2b8d39a81ae64f83
-
SHA512
bb38fb0e78a6e33b26087d18b9b64409b074961ca1b2b5149452843463a2403c2842961654485ae6d3d1ca4848f940d7562c8faa239f5600339da7e0d77e885f
-
SSDEEP
12288:1d0fOiKFR76KDmJa9FV6F9TU+ef6IfcnkNEW7tsNRcmrwxGFx+nZ1Sao/5wY:1dHd76KDnKMbfcc7tlmrwC+/Sr5wY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 335355d0cf79e921eb4fc0809e2418fd_JaffaCakes118
Files
-
335355d0cf79e921eb4fc0809e2418fd_JaffaCakes118.exe windows:4 windows x86 arch:x86
2f3cf4e5cd3892ad03c302ab2955f838
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
DrawStatusTextW
ImageList_DragMove
ImageList_Destroy
ImageList_SetDragCursorImage
ImageList_GetIconSize
InitCommonControlsEx
ImageList_Merge
ImageList_Copy
ImageList_SetImageCount
ImageList_GetBkColor
_TrackMouseEvent
CreateToolbar
GetEffectiveClientRect
ImageList_SetBkColor
ImageList_LoadImageW
ImageList_Add
ImageList_SetOverlayImage
CreateStatusWindow
CreateMappedBitmap
shell32
DragFinish
ExtractIconExA
SHGetPathFromIDListA
user32
RegisterWindowMessageA
ExitWindowsEx
MessageBoxIndirectW
GetAltTabInfo
MonitorFromWindow
GetMessageTime
RegisterClassA
GetListBoxInfo
GetMessageExtraInfo
CharToOemBuffA
CharNextExA
GetWindowTextLengthA
EnumDisplayDevicesA
EnumPropsExA
OpenDesktopW
LoadIconW
LoadStringA
EditWndProc
LoadBitmapA
GetClipboardData
IsWindowVisible
LoadKeyboardLayoutA
CharUpperBuffA
SendIMEMessageExA
CloseDesktop
DrawTextExA
UnionRect
GetQueueStatus
GetDCEx
MsgWaitForMultipleObjects
GetPropW
TranslateAcceleratorW
SetScrollInfo
IntersectRect
DefWindowProcW
DialogBoxParamW
WINNLSEnableIME
GetClassLongW
GetClassInfoW
WinHelpA
LoadMenuW
ShowWindow
SetMenuItemInfoA
GetKeyState
SetWinEventHook
RegisterClassExA
InternalGetWindowText
MessageBoxA
DestroyWindow
GetClipCursor
SetMenuItemInfoW
OemToCharA
CharLowerBuffA
LoadAcceleratorsW
GetKBCodePage
GetMessageW
GetMenuStringA
GetSysColor
GetWindowWord
SetClassLongW
CharUpperA
CreateWindowExW
GetScrollInfo
SetDeskWallpaper
VkKeyScanA
DrawEdge
wsprintfA
AdjustWindowRect
gdi32
RectInRegion
DeleteObject
SetRectRgn
RestoreDC
CreateDCA
GetObjectW
DeviceCapabilitiesExA
GetCharWidthFloatW
GetClipRgn
SelectObject
StrokeAndFillPath
GetColorSpace
DeleteDC
Pie
SetPixelFormat
SetMetaRgn
GetDeviceCaps
PlayMetaFile
GetBkColor
DeleteEnhMetaFile
EnumFontFamiliesA
CreateDIBitmap
GetViewportExtEx
GetObjectType
FillRgn
kernel32
OutputDebugStringW
GlobalFlags
ReleaseMutex
GetThreadSelectorEntry
GetUserDefaultLCID
GetLocaleInfoA
GetCurrentThread
GetModuleHandleA
GetProcAddress
SetHandleCount
RtlMoveMemory
ReadConsoleInputW
SetLastError
SetConsoleCursorPosition
FormatMessageW
OpenFileMappingW
HeapCreate
GetPrivateProfileIntW
FreeResource
OpenMutexW
FreeEnvironmentStringsA
FillConsoleOutputCharacterA
ReadConsoleOutputAttribute
FindResourceA
CreateWaitableTimerA
GetCompressedFileSizeA
GetThreadLocale
GetTempFileNameW
TlsAlloc
EnumDateFormatsW
GetVolumeInformationW
UnlockFile
lstrlenA
LeaveCriticalSection
GetLocaleInfoW
SetUnhandledExceptionFilter
SetConsoleOutputCP
IsBadWritePtr
GetSystemInfo
GetProfileSectionA
GetSystemTimeAsFileTime
RtlUnwind
CompareStringA
GetFileType
ExitProcess
CreateMailslotA
FlushConsoleInputBuffer
GetCurrentThreadId
HeapDestroy
GetCommandLineA
SetConsoleCursorInfo
GetACP
GetUserDefaultLangID
TlsGetValue
SetThreadIdealProcessor
GetAtomNameA
CreateNamedPipeW
TerminateProcess
DosDateTimeToFileTime
QueryPerformanceCounter
ReadFile
GetPrivateProfileSectionW
LCMapStringA
CloseHandle
SetLocalTime
GetEnvironmentStrings
VirtualQuery
GetSystemDefaultLCID
GetProfileIntW
GetLastError
VirtualAlloc
GetStringTypeW
HeapAlloc
GetStartupInfoW
GetEnvironmentStringsW
SetThreadLocale
GetProfileIntA
EnumSystemLocalesW
GetProcessShutdownParameters
GetCalendarInfoW
SetFilePointer
OpenMutexA
LoadResource
ExitThread
SleepEx
GlobalAlloc
GetOEMCP
GetCurrentProcessId
ConvertDefaultLocale
HeapSize
FoldStringW
GetStdHandle
VirtualProtect
VirtualUnlock
GetStringTypeA
FreeLibraryAndExitThread
ReadConsoleW
InterlockedExchange
LocalAlloc
GetVersionExA
LoadLibraryA
GetEnvironmentStringsA
GetVolumeInformationA
UnmapViewOfFile
WideCharToMultiByte
DeleteCriticalSection
SetEnvironmentVariableW
SetConsoleCtrlHandler
TerminateThread
CreateMutexA
GetModuleFileNameA
SetEnvironmentVariableA
WriteProfileSectionA
GetStartupInfoA
GetCommandLineW
SetStdHandle
GetTempPathW
GetNumberFormatA
GetTickCount
LockFileEx
IsValidCodePage
CompareStringW
VirtualFree
GetEnvironmentVariableA
HeapReAlloc
TlsFree
EnumSystemLocalesA
GetTimeZoneInformation
WritePrivateProfileSectionW
IsValidLocale
GetTimeFormatA
FlushFileBuffers
GetProcAddress
SetConsoleWindowInfo
VirtualFreeEx
HeapFree
GetCPInfo
TlsSetValue
LocalReAlloc
FreeEnvironmentStringsW
WriteFile
GetCurrentProcess
CreatePipe
GetDateFormatA
UnhandledExceptionFilter
GetTimeFormatW
EnumTimeFormatsA
EnterCriticalSection
LCMapStringW
MultiByteToWideChar
InitializeCriticalSection
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 452KB - Virtual size: 452KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 135KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ