Static task
static1
Behavioral task
behavioral1
Sample
463f7b574b8218da093a6ca10778e9a9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
463f7b574b8218da093a6ca10778e9a9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
463f7b574b8218da093a6ca10778e9a9_JaffaCakes118
-
Size
174KB
-
MD5
463f7b574b8218da093a6ca10778e9a9
-
SHA1
c838eea73d3a8dea3f2c489ea7530d6e6cc2f2c5
-
SHA256
f541d406b2f2321d6bef52c1828a5c76d84fb16b4e3ba88e1ede8cdc1c09aed1
-
SHA512
23638bf1ed13b78151fb95f2eaf19dfb0131a587315e54e7997e83b2c4f56fe830c99d23d0e95cd286eee11844351de6017a76786b85c8eace9af68dc1012c05
-
SSDEEP
3072:PuM0i0qvykKi4JhwzE+9sbKmWUqBr/hXwvktLvhXrKJ9xaPbBpbe:PlvUbDwY+9sbiUqBlCkmnxGp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 463f7b574b8218da093a6ca10778e9a9_JaffaCakes118
Files
-
463f7b574b8218da093a6ca10778e9a9_JaffaCakes118.exe windows:4 windows x86 arch:x86
ca79e3c4e81b43678990433757062065
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_Add
ImageList_DrawEx
ImageList_Destroy
ImageList_Write
ImageList_DragShowNolock
user32
DefMDIChildProcA
PeekMessageW
LoadBitmapA
GetClassNameA
TranslateMessage
ChildWindowFromPoint
GetCapture
MessageBoxA
EnableMenuItem
SetWindowPlacement
CallWindowProcA
IsZoomed
GetMenuStringA
EnumWindows
InsertMenuItemA
ShowScrollBar
GetActiveWindow
RemoveMenu
LoadKeyboardLayoutA
ScreenToClient
SetCapture
SetCursor
LoadIconA
GetMenuState
GetSysColorBrush
InvalidateRect
SendMessageA
GetWindowThreadProcessId
GetScrollPos
DispatchMessageA
MessageBeep
ShowOwnedPopups
IsDialogMessageA
RegisterClassA
RegisterClipboardFormatA
ScrollWindow
EnumThreadWindows
IsIconic
GetSubMenu
FrameRect
GetClientRect
CheckMenuItem
DrawEdge
GetIconInfo
GetKeyNameTextA
TranslateMDISysAccel
InflateRect
DrawTextA
CharNextW
DefFrameProcA
DestroyWindow
GetMenuItemCount
EnableWindow
SetForegroundWindow
ClientToScreen
GetKeyState
CreatePopupMenu
GetMessagePos
GetSystemMetrics
CharNextA
CloseClipboard
DrawFrameControl
GetFocus
EndPaint
GetMenu
SetMenuItemInfoA
GetPropA
DestroyCursor
SetWindowLongW
GetWindow
GetKeyboardType
DestroyIcon
GetSysColor
EqualRect
SetFocus
InsertMenuA
DispatchMessageW
GetForegroundWindow
MsgWaitForMultipleObjects
IsWindowVisible
SystemParametersInfoA
GetMenuItemID
GetScrollRange
TrackPopupMenu
LoadStringA
SetWindowsHookExA
GetWindowRect
ShowWindow
DrawAnimatedRects
DrawIconEx
ReleaseDC
GetWindowTextA
GetCursor
ReleaseCapture
KillTimer
SetMenu
GetLastActivePopup
MoveWindow
MapWindowPoints
IsWindowEnabled
GetWindowLongW
CreateWindowExA
EnumChildWindows
PostQuitMessage
MapVirtualKeyA
GetDesktopWindow
SetScrollInfo
GetWindowLongA
CreateIcon
AdjustWindowRectEx
GetDCEx
DeleteMenu
GetSystemMenu
EmptyClipboard
EnableScrollBar
UnregisterClassA
DrawIcon
DrawMenuBar
DefWindowProcA
RedrawWindow
GetKeyboardState
RegisterWindowMessageA
SetScrollPos
SetClassLongA
PeekMessageA
CallNextHookEx
UpdateWindow
GetDlgItem
RemovePropA
FindWindowA
CreateMenu
WaitMessage
FillRect
GetClassLongA
ActivateKeyboardLayout
OpenClipboard
UnhookWindowsHookEx
DestroyMenu
CharLowerA
OemToCharA
IsRectEmpty
IsChild
GetKeyboardLayout
GetDC
GetMenuItemInfoA
GetParent
GetTopWindow
IsWindow
SetWindowPos
PtInRect
SetClipboardData
SetParent
GetCursorPos
SetTimer
GetWindowPlacement
PostMessageA
SetWindowLongA
GetKeyboardLayoutList
GetKeyboardLayoutNameA
IsDialogMessageW
GetClipboardData
CharLowerBuffA
GetScrollInfo
GetClassInfoA
SetRect
IntersectRect
LoadCursorA
IsWindowUnicode
GetWindowDC
CharToOemA
SetPropA
BeginPaint
SetWindowTextA
SetScrollRange
CharUpperBuffA
WindowFromPoint
wsprintfA
OffsetRect
gdi32
CreateCompatibleDC
GetDCOrgEx
GetCurrentPositionEx
BitBlt
CreatePalette
kernel32
WriteFile
GetThreadLocale
GetModuleFileNameA
DeleteFileA
InitializeCriticalSection
GetModuleHandleA
GlobalAlloc
CloseHandle
ResetEvent
lstrcmpA
FindResourceA
GetCPInfo
GlobalDeleteAtom
CompareStringA
WideCharToMultiByte
lstrcatA
SetLastError
GetTickCount
GetEnvironmentStrings
HeapDestroy
GetLastError
VirtualFree
GetFileAttributesA
ExitThread
GetACP
CreateEventA
VirtualAlloc
Sleep
GetCommandLineA
LoadLibraryA
LoadLibraryExA
CreateFileA
HeapAlloc
lstrlenA
SetEndOfFile
FreeResource
CreateThread
GetProcessHeap
GetVersion
GetFileType
GetCurrentThreadId
LocalFree
ExitProcess
WaitForSingleObject
GetStartupInfoA
SizeofResource
LocalAlloc
GetSystemDefaultLangID
GetVersionExA
GetCurrentProcess
lstrcmpiA
GetStringTypeA
SetFilePointer
GetStringTypeW
ReadFile
GetOEMCP
FindFirstFileA
MoveFileA
GetLocaleInfoA
GetProcAddress
SetEvent
DeleteCriticalSection
GetFileSize
VirtualQuery
FormatMessageA
GetDateFormatA
GetLocalTime
EnumCalendarInfoA
FreeLibrary
GetCurrentProcessId
lstrcpyA
MulDiv
GlobalFindAtomA
GetUserDefaultLCID
LoadResource
SetHandleCount
GetStdHandle
SetErrorMode
FindClose
HeapFree
GetCurrentThread
GetFullPathNameA
LockResource
VirtualAllocEx
lstrcpynA
LocalReAlloc
MoveFileExA
ole32
CreateStreamOnHGlobal
StgCreateDocfileOnILockBytes
OleRegGetUserType
CreateBindCtx
CoCreateInstanceEx
GetHGlobalFromStream
CoGetContextToken
CLSIDFromProgID
advapi32
RegDeleteValueA
RegLoadKeyA
RegOpenKeyExA
RegCreateKeyA
msvcrt
calloc
rand
cos
malloc
memcpy
shell32
Shell_NotifyIconA
shlwapi
SHQueryValueExA
SHGetValueA
SHSetValueA
PathIsDirectoryA
PathGetCharTypeA
SHQueryInfoKeyA
PathFileExistsA
PathIsContentTypeA
SHEnumValueA
Sections
.text Size: 162KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 8KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE