Static task
static1
Behavioral task
behavioral1
Sample
33f4043e61965c30c159b95933201f63_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
33f4043e61965c30c159b95933201f63_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
33f4043e61965c30c159b95933201f63_JaffaCakes118
-
Size
696KB
-
MD5
33f4043e61965c30c159b95933201f63
-
SHA1
fd8d6bcd6ab467e066990e705572f0b3fb5e3b4c
-
SHA256
e5dc4c44c302de3304215a7f96c9eeda4f9175039a6911d1fead8a535b576f6c
-
SHA512
83d70514f8c163d8c49d2069f49fc5787e26a02f7b796bc3e5607ba116b0fe7db839c18034f876ecfb290c4b47790d379b2fe2d9f2c0cc9c6fb8eeee7861d670
-
SSDEEP
12288:hKoXSJfrebRHBGdufmjfpxdb8af4O+m8hEGvcNRrv21MY5BSVT:hKoXS5reydo8f18ZxbEGkTb4SJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 33f4043e61965c30c159b95933201f63_JaffaCakes118
Files
-
33f4043e61965c30c159b95933201f63_JaffaCakes118.exe windows:4 windows x86 arch:x86
3aa86e7dc885cc35cf58e5cee1b013b1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetStdHandle
TlsAlloc
ReadFile
GetLastError
CompareStringW
SetLastError
lstrcatW
GetVersion
HeapFree
SetFilePointer
GetLocalTime
GetModuleFileNameA
LoadLibraryA
DeleteCriticalSection
TerminateProcess
CloseHandle
InterlockedDecrement
TlsGetValue
TlsSetValue
CreateDirectoryExA
WriteFile
SetEnvironmentVariableA
CreateMutexA
VirtualFree
LCMapStringA
ExitProcess
TlsFree
GetProcAddress
CompareStringA
IsBadWritePtr
RtlUnwind
LCMapStringW
DeleteFileA
MultiByteToWideChar
GetCurrentProcess
GetModuleHandleA
GetTickCount
FlushFileBuffers
VirtualQuery
GetACP
GetStringTypeA
GetCurrentThread
VirtualAlloc
GetFileType
InterlockedExchange
HeapReAlloc
EnterCriticalSection
GetSystemTime
InitializeCriticalSection
GetStringTypeW
GetCurrentProcessId
GetCurrentThreadId
GetCPInfo
GetTimeZoneInformation
UnhandledExceptionFilter
GetThreadContext
GetStartupInfoW
HeapCreate
GetCommandLineA
WaitCommEvent
SetHandleCount
HeapDestroy
InterlockedIncrement
LeaveCriticalSection
HeapAlloc
FreeEnvironmentStringsW
GetStartupInfoA
QueryPerformanceCounter
GetSystemTimeAsFileTime
SetConsoleTextAttribute
SetStdHandle
GetOEMCP
SetCurrentDirectoryW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
FreeEnvironmentStringsA
OpenMutexA
shell32
SHLoadInProc
SHInvokePrinterCommandA
user32
GetMenuStringW
EnumWindows
InvalidateRgn
DdeConnect
RegisterClassExA
SetWindowLongA
GetClipboardSequenceNumber
CreateWindowExW
GetTitleBarInfo
EndMenu
GetPriorityClipboardFormat
SetTimer
CharPrevA
SwapMouseButton
BeginPaint
MessageBoxW
DdeFreeDataHandle
EnableWindow
UnregisterDeviceNotification
EnumWindowStationsW
IsWindowVisible
ShowWindow
NotifyWinEvent
GetMenuState
DrawTextW
TranslateMessage
SendInput
ChangeDisplaySettingsExW
DdeGetLastError
GetTabbedTextExtentW
HideCaret
IsDialogMessageW
DlgDirListW
CopyImage
CreateWindowExA
SetDoubleClickTime
DefWindowProcA
PostQuitMessage
DestroyWindow
DrawFocusRect
AnimateWindow
EnumWindowStationsA
LoadCursorW
GetClipCursor
ShowScrollBar
OemKeyScan
RegisterClassExW
GetDlgItemTextW
GetClipboardOwner
TileWindows
EndDeferWindowPos
GetWindow
CharUpperA
SetThreadDesktop
GetGuiResources
IsCharAlphaW
RegisterClassA
EndDialog
comdlg32
GetSaveFileNameW
comctl32
ImageList_SetDragCursorImage
ImageList_LoadImage
CreateToolbar
InitCommonControlsEx
gdi32
CreateBrushIndirect
GetOutlineTextMetricsW
GetCharABCWidthsW
CreateHalftonePalette
GetWindowOrgEx
Escape
GetGraphicsMode
GdiSetBatchLimit
GetWindowExtEx
CloseEnhMetaFile
gdiPlaySpoolStream
GetCharacterPlacementA
SetMetaFileBitsEx
RectInRegion
GetGlyphOutlineA
UpdateICMRegKeyA
RoundRect
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 448KB - Virtual size: 447KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 140KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ