Static task
static1
Behavioral task
behavioral1
Sample
412ab0ebea4c0675fd3e90502cce46b5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
412ab0ebea4c0675fd3e90502cce46b5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
412ab0ebea4c0675fd3e90502cce46b5_JaffaCakes118
-
Size
281KB
-
MD5
412ab0ebea4c0675fd3e90502cce46b5
-
SHA1
87ab80a09ab7c6cafea950cf8243f85a56853a2e
-
SHA256
22360b6ff0d2d7c33fae333db421e5718c28da6bb9fedf122a973d0435bbcfa6
-
SHA512
7a0fda2e14ce4925b046eb908839af83d0875782288a4c99862d5b4544545b9688e07bbffa8f60501058692b8be969cf59aad150915c2037eb90c5e75a51a67c
-
SSDEEP
6144:Jv6Sx3N1lrF7ryRGsKPYPt4giM9+JHd9umuuqYvU:JC63NjZeRGPutWpc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 412ab0ebea4c0675fd3e90502cce46b5_JaffaCakes118
Files
-
412ab0ebea4c0675fd3e90502cce46b5_JaffaCakes118.exe windows:4 windows x86 arch:x86
0f7a0f9a95d23edd4b702f9cd733eaad
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
HeapFree
GetCommandLineA
HeapReAlloc
HeapAlloc
RaiseException
TerminateProcess
GetStartupInfoA
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetACP
HeapDestroy
GetTimeZoneInformation
RtlUnwind
UnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetFileType
GetThreadLocale
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
SetEnvironmentVariableA
GetFileTime
GetFileSize
GetFileAttributesA
GetTickCount
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
VirtualFree
HeapCreate
SetErrorMode
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
MulDiv
GetModuleHandleA
GetProcAddress
SetLastError
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
GetCurrentProcess
DuplicateHandle
GetStringTypeA
WritePrivateProfileStringA
GetProfileStringA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
SizeofResource
GetLastError
GlobalFlags
lstrcpynA
CloseHandle
GlobalAlloc
lstrcmpA
GetCurrentThread
GetModuleFileNameA
FormatMessageA
LocalFree
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GetCurrentThreadId
GetStringTypeW
SetUnhandledExceptionFilter
CompareStringW
LoadResource
user32
InvalidateRect
CharUpperA
InflateRect
RegisterClipboardFormatA
PostThreadMessageA
CharNextA
LoadStringA
DestroyMenu
GetSysColorBrush
LoadCursorA
GetDesktopWindow
PtInRect
GetClassNameA
MapDialogRect
SetWindowContextHelpId
GetMessageA
TranslateMessage
ValidateRect
GetCursorPos
SetCursor
PostQuitMessage
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
LoadIconA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
SetFocus
AdjustWindowRectEx
GetClientRect
IsWindowVisible
CopyAcceleratorTableA
GetTopWindow
IsChild
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
SetRect
MessageBeep
GetNextDlgGroupItem
CheckMenuItem
EnableMenuItem
GetWindowPlacement
GetWindowRect
CopyRect
LoadBitmapA
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
ScreenToClient
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
EnableWindow
SendMessageA
CallNextHookEx
GetKeyState
GetFocus
MessageBoxA
PostMessageA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
IsWindowUnicode
gdi32
DeleteObject
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
BitBlt
CreateCompatibleDC
CreateBitmap
GetTextColor
GetBkColor
DPtoLP
LPtoDP
GetMapMode
PatBlt
CreateDIBitmap
GetTextExtentPointA
IntersectClipRect
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkMode
SetBkColor
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateFontA
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
comctl32
ord17
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoRegisterMessageFilter
CoTaskMemFree
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
CoTaskMemAlloc
olepro32
ord253
oleaut32
SysStringLen
SysAllocStringByteLen
VariantCopy
SysAllocString
VariantChangeType
VariantTimeToSystemTime
VariantClear
SysAllocStringLen
SysFreeString
Sections
.text Size: 144KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 77KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE