Static task
static1
Behavioral task
behavioral1
Sample
38eecfb5297b8190bbff25b22f2430ff_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
38eecfb5297b8190bbff25b22f2430ff_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
38eecfb5297b8190bbff25b22f2430ff_JaffaCakes118
-
Size
512KB
-
MD5
38eecfb5297b8190bbff25b22f2430ff
-
SHA1
7421e7d7baa9c71c5d3581d9ca74381c612b20c1
-
SHA256
448966079ca3c91551583b21c2df99c338762e7c243632f82d71e4ef883ac251
-
SHA512
938df33256a7562bb471a7cae267a004943df7e215b7a43c1efd08d18b6ed893a4c8489f47322d350107e16785eed9d001bb2349aec14c728bf6ca19c0bfecaa
-
SSDEEP
6144:nELIOKOh5UH0f0Z0Rl/urPjWAloi41uAj:nELDTKH0sZdWSoi4MAj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 38eecfb5297b8190bbff25b22f2430ff_JaffaCakes118
Files
-
38eecfb5297b8190bbff25b22f2430ff_JaffaCakes118.exe windows:4 windows x86 arch:x86
f1d0cd48d0a3b3aed80c6ff80d25288e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
TerminateProcess
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
HeapFree
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
HeapAlloc
RtlUnwind
SetErrorMode
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
WritePrivateProfileStringA
RaiseException
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
InterlockedDecrement
GetCurrentThread
lstrcmpA
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
SetLastError
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
lstrcpynA
GetModuleHandleA
GetProcAddress
WinExec
GetSystemDirectoryA
GetWindowsDirectoryA
ExpandEnvironmentStringsA
FindFirstFileA
FindClose
FindResourceA
LoadResource
LockResource
SizeofResource
OpenMutexA
CloseHandle
CreateMutexA
ReleaseMutex
lstrlenA
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetEnvironmentStringsW
InterlockedExchange
user32
LoadCursorA
GetSysColorBrush
DestroyMenu
wsprintfA
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetMessageA
TranslateMessage
GetActiveWindow
GetCursorPos
ValidateRect
SetCursor
PostQuitMessage
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
TabbedTextOutA
GetMenuState
RegisterWindowMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
IsWindow
GetWindowTextLengthA
GetWindowTextA
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
SetFocus
SendMessageA
PostMessageA
GetParent
EnableWindow
GetForegroundWindow
DrawTextA
GetClassInfoA
SetForegroundWindow
PeekMessageA
MapWindowPoints
MessageBoxA
GetKeyState
IsWindowVisible
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
AdjustWindowRectEx
RegisterClassA
UnregisterClassA
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
CreateWindowExA
FindWindowA
LoadBitmapA
DrawIcon
IsIconic
GetWindowRect
GetClientRect
GetDC
ReleaseDC
UpdateWindow
InvalidateRect
RedrawWindow
GetFocus
LoadIconA
DestroyIcon
GetSystemMetrics
GetDlgCtrlID
GetSysColor
GetWindow
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
CopyRect
PtInRect
gdi32
PtVisible
GetStockObject
CreateBitmap
DeleteDC
RectVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
CreateSolidBrush
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
SetBkColor
GetClipBox
DeleteObject
BitBlt
StretchBlt
CreateCompatibleDC
GetObjectA
CreateFontIndirectA
SetTextColor
SetBkMode
TextOutA
msimg32
TransparentBlt
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
ExtractIconExA
comctl32
_TrackMouseEvent
ImageList_ReplaceIcon
ord17
ImageList_Destroy
ImageList_Create
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 348KB - Virtual size: 345KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ