Static task
static1
Behavioral task
behavioral1
Sample
337c443070fbe60166dd93da6e5b0cff_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
337c443070fbe60166dd93da6e5b0cff_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
337c443070fbe60166dd93da6e5b0cff_JaffaCakes118
-
Size
616KB
-
MD5
337c443070fbe60166dd93da6e5b0cff
-
SHA1
eb72102c7759a4e17500f1d65c86ec97bc6c7cce
-
SHA256
e065bcdec4de4e2b2d2e2368ae8d3a9557be67646fba87c15c4e4e3a272575eb
-
SHA512
67e55de12ae2b04e75c5998b870952bf66b651755e23a16ad2b7d77d96ea9f6a4b21309ddef898793bc2fa7f6d69f2a1517d02b65d4d8ddb3bc858ed821d1cd1
-
SSDEEP
12288:vp6WFQ5oMlua+j3EPp36jIqfzbks7y3v9sbuI12OhHIF:9mCMcLj0PpAfzC3vKqUhH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 337c443070fbe60166dd93da6e5b0cff_JaffaCakes118
Files
-
337c443070fbe60166dd93da6e5b0cff_JaffaCakes118.exe windows:4 windows x86 arch:x86
a2071dbc9da16b42ebdb9caaed5574b2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CreatePopupMenu
ShowCaret
EnumDisplaySettingsW
GetKeyboardLayoutNameW
GetPropW
ShowWindow
CreateWindowExA
DdeImpersonateClient
ChildWindowFromPointEx
GetDlgItemTextW
GetDesktopWindow
DrawCaption
DestroyIcon
FindWindowA
SendDlgItemMessageW
DestroyWindow
SendIMEMessageExW
VkKeyScanW
GetWindowLongA
RegisterClassExA
AppendMenuW
DefWindowProcA
EditWndProc
UnhookWindowsHook
AnyPopup
MsgWaitForMultipleObjects
MessageBoxA
KillTimer
GetClipCursor
DrawMenuBar
SendMessageW
GetOpenClipboardWindow
CharPrevA
EnumDisplaySettingsA
PtInRect
SetThreadDesktop
RegisterClassA
CreateDesktopA
EndDialog
ShowOwnedPopups
DialogBoxIndirectParamW
comctl32
ImageList_Duplicate
ImageList_Merge
ImageList_GetIcon
ImageList_DragEnter
CreateMappedBitmap
ImageList_SetFlags
CreatePropertySheetPage
CreateToolbarEx
ImageList_Add
CreateStatusWindowW
ImageList_Replace
InitCommonControlsEx
ImageList_ReplaceIcon
ImageList_BeginDrag
ImageList_Write
ImageList_Draw
ImageList_Create
ImageList_AddMasked
DrawInsert
ImageList_EndDrag
ImageList_Copy
comdlg32
FindTextA
PrintDlgA
ChooseFontW
kernel32
FlushFileBuffers
TlsFree
GetTimeZoneInformation
GlobalAddAtomW
CompareStringA
CreateMutexA
CommConfigDialogA
WideCharToMultiByte
IsValidLocale
SystemTimeToFileTime
WaitForMultipleObjects
SetEnvironmentVariableA
ExitProcess
CloseHandle
UnhandledExceptionFilter
HeapReAlloc
GetVersion
GlobalDeleteAtom
RtlFillMemory
EnterCriticalSection
GetThreadSelectorEntry
SetFilePointer
ConnectNamedPipe
PulseEvent
FreeEnvironmentStringsA
MultiByteToWideChar
CreateMailslotA
LeaveCriticalSection
GetFileType
InterlockedDecrement
OpenMutexW
QueryPerformanceCounter
CreateFileA
LoadLibraryA
LCMapStringA
HeapDestroy
HeapAlloc
SetConsoleMode
HeapFree
GetStartupInfoA
VirtualFree
lstrcmpiW
GetStringTypeW
SetHandleCount
GetCurrentProcessId
GetModuleFileNameA
GetEnvironmentStrings
TlsAlloc
IsBadWritePtr
RtlUnwind
FreeEnvironmentStringsW
CompareStringW
SetThreadLocale
CompareFileTime
VirtualQuery
GetLocalTime
InterlockedExchange
EnumDateFormatsA
DeleteCriticalSection
WriteFile
HeapCreate
GetStringTypeA
GetACP
GetPrivateProfileSectionNamesW
GetLastError
TlsGetValue
GetSystemTime
SetLastError
GetCurrentThread
SetStdHandle
InterlockedIncrement
GetSystemTimeAsFileTime
GetProcAddress
GetProfileIntW
GetTickCount
GetLogicalDrives
GetCommandLineA
GetStdHandle
GetOEMCP
LCMapStringW
lstrcpyn
GetEnvironmentStringsW
GetModuleHandleA
ReadFile
InitializeCriticalSection
OpenMutexA
GetThreadLocale
GetCPInfo
TerminateProcess
VirtualAlloc
GetCurrentThreadId
GetCurrentProcess
EnumTimeFormatsA
CreateToolhelp32Snapshot
TlsSetValue
Sections
.text Size: 180KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 249KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ