Static task
static1
Behavioral task
behavioral1
Sample
34d00daf4f182e844b69ec557d602845_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
34d00daf4f182e844b69ec557d602845_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
34d00daf4f182e844b69ec557d602845_JaffaCakes118
-
Size
260KB
-
MD5
34d00daf4f182e844b69ec557d602845
-
SHA1
014e9986abb1a648a41aa565c467eae6af31af49
-
SHA256
19eefe4edbcd9a68328a88f4d4d5b6f06036a6fa5463751bd8daecf8af002aa9
-
SHA512
a75abdcef6c34ea0252871d3046c160920ba45b0bf07940e12905c701ae7cb1ca06209555d6203ac8089e9da9e71456a84d5c4a0be255538090059424914d090
-
SSDEEP
6144:rKaNJuuxGXAhTHAMAYTnqedLGJ3sPfbbU75lMg:uaNJuuCKHLd68HbbU7/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 34d00daf4f182e844b69ec557d602845_JaffaCakes118
Files
-
34d00daf4f182e844b69ec557d602845_JaffaCakes118.exe windows:4 windows x86 arch:x86
56218066ab730d9347b306757556b9ce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupIterateCabinetA
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
kernel32
GlobalFlags
GetLocaleInfoA
GetCPInfo
GetOEMCP
HeapFree
RtlUnwind
VirtualAlloc
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
ExitProcess
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
HeapSize
HeapCreate
VirtualFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
GetACP
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetFileTime
GetFileAttributesA
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcmpA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
GetModuleFileNameW
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetVersionExA
SetErrorMode
GetModuleHandleA
FreeResource
GetProcAddress
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
CloseHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
lstrcpyA
lstrcatA
Sleep
CreateMutexA
ReleaseMutex
GetModuleFileNameA
GetTickCount
GetTempPathA
GetTempFileNameA
LoadLibraryA
FreeLibrary
LoadResource
LockResource
SizeofResource
FindResourceA
GetLastError
lstrlenA
lstrlenW
WideCharToMultiByte
CompareStringA
CompareStringW
MultiByteToWideChar
GetVersion
InterlockedExchange
HeapDestroy
user32
GetMessageA
TranslateMessage
ValidateRect
GetWindowThreadProcessId
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassNameA
SetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
UpdateWindow
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
PtInRect
CharUpperA
MessageBoxA
EnableWindow
SendMessageA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
ReleaseDC
GetDC
UnregisterClassA
PostQuitMessage
DestroyMenu
GetClassLongA
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
EndDialog
GetNextDlgTabItem
GetParent
IsWindowEnabled
GetDlgItem
GetWindowLongA
CopyRect
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetPropA
gdi32
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
GetDeviceCaps
DeleteObject
SetMapMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegCreateKeyA
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegOpenKeyA
RegCloseKey
shell32
ShellExecuteA
shlwapi
PathStripToRootA
PathIsUNCA
PathFindFileNameA
PathFindExtensionA
SHSetValueA
ole32
StringFromCLSID
CoTaskMemFree
CLSIDFromString
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 208KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ