Static task
static1
Behavioral task
behavioral1
Sample
45ece0199e2171e652c8e930cf7ace6b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
45ece0199e2171e652c8e930cf7ace6b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
45ece0199e2171e652c8e930cf7ace6b_JaffaCakes118
-
Size
277KB
-
MD5
45ece0199e2171e652c8e930cf7ace6b
-
SHA1
89dc9f04ada9b30ef7317646813d1c7370eae8d3
-
SHA256
2b0687b74f8a4f36358ecd75843d47e56d63a67fc079ab5e719035a6b4a0c650
-
SHA512
8bce53062e3019f8b7f1e298085f3f5aa9692157e0bac29f1fbda77784e7357a474c8a19f79e250c3d9b23e039c9ec2ac5400d1f5d5a3793bbcb025502d82531
-
SSDEEP
3072:mVWZb1K/E4UiyENG/G07WoAa91BhlDBDi9udwDNJfV+JE+o0LVxVruuPsvTYd:mAZbFEypnGWkEJJLVHyRUd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 45ece0199e2171e652c8e930cf7ace6b_JaffaCakes118
Files
-
45ece0199e2171e652c8e930cf7ace6b_JaffaCakes118.exe windows:1 windows x86 arch:x86
a3f6ab9574ea176bfdc0b044238fdd35
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
OemToCharA
LoadBitmapA
ReleaseDC
GetWindowRect
GetClassNameA
BeginPaint
GetDC
EndPaint
SetWindowTextA
CharUpperA
CharLowerA
CreateDialogParamA
GetClientRect
SendMessageA
InvalidateRect
GetDlgItem
GetWindowTextA
EnableWindow
IsWindowVisible
SetFocus
ScreenToClient
CharNextA
InflateRect
SetRectEmpty
GetSystemMetrics
SetWindowPos
UpdateWindow
ShowWindow
DestroyWindow
wsprintfA
LoadStringA
MessageBeep
MessageBoxA
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
SetTimer
PeekMessageA
IsWindow
IsDialogMessageA
TranslateMessage
DispatchMessageA
KillTimer
SetRect
FillRect
CharToOemA
CharPrevA
PostQuitMessage
DefWindowProcA
ExitWindowsEx
FindWindowA
PostMessageA
RegisterWindowMessageA
DdeGetData
DdeFreeDataHandle
DdeConnect
DdeClientTransaction
DdeGetLastError
DdeDisconnect
DdeFreeStringHandle
DdeUninitialize
DdeInitializeA
DdeCreateStringHandleA
GetClassInfoA
GetWindowLongA
GetWindow
GetSysColor
gdi32
SetPixel
GetTextExtentPointA
DeleteObject
GetSystemPaletteEntries
CreatePalette
CreateDIBitmap
CreateBitmap
SetBkColor
CreatePen
MoveToEx
LineTo
CreateCompatibleBitmap
SaveDC
CreateSolidBrush
GetStockObject
Rectangle
RestoreDC
GetDeviceCaps
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
SelectPalette
RealizePalette
GetObjectA
kernel32
OpenFile
FindClose
GetFileTime
SetFileTime
GetStdHandle
GetCPInfo
GetOEMCP
GetACP
UnhandledExceptionFilter
RtlUnwind
ExitProcess
GetLocalTime
GetCommandLineA
GetEnvironmentStrings
GetStartupInfoA
GlobalHandle
GlobalCompact
GlobalReAlloc
GetCurrentDirectoryA
_llseek
FileTimeToDosDateTime
FileTimeToLocalFileTime
GetFileType
VirtualFree
GetModuleHandleA
WideCharToMultiByte
GetSystemInfo
GetTimeZoneInformation
SetEnvironmentVariableA
MultiByteToWideChar
WinExec
MoveFileExA
GetCurrentThread
GetCurrentProcess
lstrcmpA
CreateDirectoryA
GetDiskFreeSpaceA
GetLastError
FindNextFileA
SetCurrentDirectoryA
GetDriveTypeA
SetFileAttributesA
GetFileAttributesA
RemoveDirectoryA
GetTickCount
GetModuleFileNameA
lstrcpyA
IsDBCSLeadByte
FreeLibrary
GetProcAddress
LoadLibraryA
GetVersion
GlobalFree
GlobalUnlock
FreeResource
_lclose
_hwrite
CreateFileA
lstrcatA
GetWindowsDirectoryA
GlobalLock
GlobalAlloc
LockResource
SizeofResource
LoadResource
FindResourceA
_lread
LocalFileTimeToFileTime
SetErrorMode
lstrcmpiA
GetPrivateProfileStringA
Sleep
lstrlenA
GetSystemDirectoryA
FindFirstFileA
VirtualAlloc
CloseHandle
_lwrite
GetFileSize
SetEndOfFile
DosDateTimeToFileTime
SetFilePointer
ReadFile
WriteFile
DeleteFileA
MoveFileA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
advapi32
RegDeleteValueA
RegCloseKey
RegQueryValueExA
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenThreadToken
OpenProcessToken
GetTokenInformation
EqualSid
RegEnumValueA
RegOpenKeyA
InitializeSecurityDescriptor
RegSetValueExA
RegEnumKeyA
RegDeleteKeyA
RegCreateKeyExA
AllocateAndInitializeSid
SetSecurityDescriptorOwner
FreeSid
comdlg32
GetSaveFileNameA
GetOpenFileNameA
Sections
.text Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 145KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ