Static task
static1
Behavioral task
behavioral1
Sample
3748ab526122248af5d9c4ccef6ca0fc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3748ab526122248af5d9c4ccef6ca0fc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3748ab526122248af5d9c4ccef6ca0fc_JaffaCakes118
-
Size
111KB
-
MD5
3748ab526122248af5d9c4ccef6ca0fc
-
SHA1
03a47449784a1a3dfcbdc74db2bf7a71f002bea3
-
SHA256
e68bd26ebbb8ac718d5c7a766126d58484170872ddf167b9df7b17ae5cf0520f
-
SHA512
e0decc832f097600666342f5a91946aafe7628ef43dd0cc073b3ba70565cc3d3a53d3e9915d874c181fef5f64d130d8b4416b6aa0af80c14f3cc30951cddf4f9
-
SSDEEP
1536:F9TYYFcj/nE5QXJezy47tBJRU4R4iu84a6xMtA0xCL4W:/B6AK5eX7tNP45ai0S
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3748ab526122248af5d9c4ccef6ca0fc_JaffaCakes118
Files
-
3748ab526122248af5d9c4ccef6ca0fc_JaffaCakes118.exe windows:4 windows x86 arch:x86
da9e44dee78f5713fe976522e3dbab01
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
OleLoadPicture
comctl32
ImageList_Add
ImageList_Read
user32
SetCursor
GetWindowThreadProcessId
GetIconInfo
EnableScrollBar
MsgWaitForMultipleObjects
GetMenu
ReleaseCapture
MoveWindow
GetWindowPlacement
InsertMenuA
PtInRect
InflateRect
SetWindowsHookExA
TranslateMessage
CharNextW
CallNextHookEx
ScreenToClient
GetDlgItem
DestroyMenu
DeleteMenu
AdjustWindowRectEx
GetWindowRect
GetCursorPos
IsWindowEnabled
EnumChildWindows
DrawFrameControl
GetDC
CharLowerA
CharToOemA
SetWindowLongW
GetPropA
GetMenuItemCount
MapWindowPoints
CreateMenu
SetMenuItemInfoA
DrawTextA
MessageBeep
GetKeyState
GetMenuItemInfoA
LoadKeyboardLayoutA
EnableMenuItem
wsprintfA
FillRect
GetLastActivePopup
GetSystemMenu
GetClassLongA
TranslateMDISysAccel
CharNextA
EnumWindows
OffsetRect
SetActiveWindow
SetScrollPos
SetForegroundWindow
InvalidateRect
SetWindowTextA
RegisterClassA
DrawIconEx
CreateWindowExA
OemToCharA
DispatchMessageA
LoadStringA
ChildWindowFromPoint
GetWindowDC
PostMessageA
GetWindowTextA
IsDialogMessageA
IsRectEmpty
GetScrollPos
ActivateKeyboardLayout
GetParent
DefFrameProcA
GetMenuItemID
IsDialogMessageW
GetScrollRange
GetKeyboardState
DestroyIcon
GetKeyNameTextA
RemovePropA
GetSubMenu
GetForegroundWindow
SetWindowPlacement
ClientToScreen
UnhookWindowsHookEx
SetRect
PeekMessageW
DrawEdge
DrawIcon
GetKeyboardLayoutList
GetClipboardData
IsChild
GetMessagePos
GetWindowLongW
SystemParametersInfoA
LoadBitmapA
SetParent
SetScrollRange
GetCapture
InsertMenuItemA
ReleaseDC
DispatchMessageW
SetClipboardData
RegisterWindowMessageA
SendMessageW
EnableWindow
SetCapture
DefWindowProcA
EnumThreadWindows
GetClassInfoA
GetActiveWindow
CharLowerBuffA
GetSysColorBrush
TrackPopupMenu
DrawAnimatedRects
SetMenu
CharUpperBuffA
GetSysColor
GetWindowLongA
WindowFromPoint
CheckMenuItem
SetClassLongA
EndPaint
GetKeyboardLayout
GetSystemMetrics
RegisterClipboardFormatA
DefMDIChildProcA
CallWindowProcA
RemoveMenu
GetScrollInfo
UnregisterClassA
CreateIcon
BeginPaint
SetPropA
GetClassNameA
UpdateWindow
DrawMenuBar
OpenClipboard
IsWindowVisible
GetClientRect
MessageBoxA
CloseClipboard
PostQuitMessage
GetTopWindow
EmptyClipboard
IsWindow
MapVirtualKeyA
LoadIconA
SetWindowLongA
FindWindowA
PeekMessageA
SendMessageA
GetWindow
GetDesktopWindow
ShowScrollBar
LoadCursorA
GetKeyboardType
FrameRect
CreatePopupMenu
SetWindowPos
GetDCEx
GetFocus
KillTimer
ShowOwnedPopups
DestroyCursor
GetMenuState
IsZoomed
IntersectRect
GetMenuStringA
ShowWindow
ScrollWindow
DestroyWindow
WaitMessage
RedrawWindow
kernel32
lstrlenA
WriteFile
RaiseException
GetFileAttributesA
GetCurrentThread
GetCPInfo
LocalReAlloc
GetStartupInfoA
SetLastError
GetCommandLineA
GetFullPathNameA
GetThreadLocale
VirtualFree
MulDiv
GlobalFindAtomA
GetCurrentProcess
GetStdHandle
VirtualQuery
SetEndOfFile
GetDateFormatA
Sleep
LockResource
GetSystemDefaultLangID
GetVersionExA
HeapDestroy
GetDiskFreeSpaceA
ReadFile
GetACP
GetTickCount
CompareStringA
GetModuleHandleA
LoadResource
LocalFree
EnterCriticalSection
CreateEventA
FreeResource
GlobalAlloc
lstrcmpiA
lstrcpyA
lstrcmpA
SetHandleCount
SizeofResource
SetErrorMode
SetFilePointer
GetOEMCP
CreateFileA
VirtualAlloc
GetCurrentProcessId
GetLocaleInfoA
GetStringTypeW
GlobalDeleteAtom
ExitThread
InitializeCriticalSection
HeapFree
GetProcessHeap
FreeLibrary
CreateThread
GetLastError
FindFirstFileA
SetThreadLocale
MoveFileA
ResetEvent
lstrcatA
lstrcpynA
WaitForSingleObject
GetCurrentThreadId
LoadLibraryA
WideCharToMultiByte
GetProcAddress
FormatMessageA
ExitProcess
HeapAlloc
GetFileSize
CloseHandle
GetModuleFileNameA
FindResourceA
FindClose
GetEnvironmentStrings
MoveFileExA
GetLocalTime
LoadLibraryExA
EnumCalendarInfoA
LocalAlloc
msvcrt
memmove
cos
shlwapi
PathIsDirectoryA
PathGetCharTypeA
SHStrDupA
SHQueryInfoKeyA
SHGetValueA
PathIsContentTypeA
SHQueryValueExA
SHSetValueA
PathFileExistsA
version
VerFindFileA
advapi32
GetLengthSid
RegDeleteValueA
GetUserNameA
RegEnumKeyA
shell32
SHGetFolderPathA
Shell_NotifyIconA
SHGetFileInfoA
Sections
.text Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 512B - Virtual size: 463B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE