Static task
static1
Behavioral task
behavioral1
Sample
59d5feca0b49d6c863af6bfdee6159c9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
59d5feca0b49d6c863af6bfdee6159c9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
59d5feca0b49d6c863af6bfdee6159c9_JaffaCakes118
-
Size
468KB
-
MD5
59d5feca0b49d6c863af6bfdee6159c9
-
SHA1
822a961905bb0aef232d84c0c7313ff58a0e13d9
-
SHA256
2d6711b8a644d6899c2898feaf6f360f30efb768db71ff4bff03f77183fd91e8
-
SHA512
2ddcb9fd0ddd89e86c9cbfb5a077706728984e7bc4432805515d2f81fb9c054866cfd2906e828e2221a61deeb51f04e7e56cd18c4a878aa91470e8edcd39d5d3
-
SSDEEP
6144:YITNvnVN1Q1ttJXDlcwJ/TItbsdVeQXmgelzP/jzBSuoKiMFpCE4gGId8fAbCT:rnVs7tJTlN9cxsdE2mbLIuniMOgGRR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 59d5feca0b49d6c863af6bfdee6159c9_JaffaCakes118
Files
-
59d5feca0b49d6c863af6bfdee6159c9_JaffaCakes118.exe windows:4 windows x86 arch:x86
4e5910d8dd924c402866d951d69e9bce
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
FillRect
ReleaseDC
GetDC
EndPaint
BeginPaint
EndDialog
SetWindowTextA
SetDlgItemTextA
LoadBitmapA
GetSystemMetrics
SetWindowPos
UpdateWindow
ShowWindow
DestroyWindow
wsprintfA
SendMessageA
OemToCharA
MessageBoxA
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
SetTimer
PeekMessageA
IsWindow
IsDialogMessageA
TranslateMessage
DispatchMessageA
KillTimer
DialogBoxParamA
CharLowerA
GetClientRect
LoadStringA
MessageBeep
CreateDialogParamA
CharUpperA
CharToOemA
CharPrevA
PostQuitMessage
DefWindowProcA
GetDlgItem
GetWindowTextA
InvalidateRect
IsWindowVisible
SetFocus
EnableWindow
PostMessageA
CharNextA
InflateRect
ScreenToClient
GetWindowRect
SetRectEmpty
ExitWindowsEx
FindWindowA
RegisterWindowMessageA
DdeGetData
DdeFreeDataHandle
DdeConnect
DdeClientTransaction
DdeGetLastError
DdeDisconnect
DdeFreeStringHandle
DdeUninitialize
DdeInitializeA
DdeCreateStringHandleA
GetClassInfoA
GetWindowLongA
GetWindow
GetClassNameA
GetSysColor
SetRect
gdi32
SetPixel
DeleteObject
GetTextExtentPointA
GetSystemPaletteEntries
CreatePalette
CreateDIBitmap
CreateBitmap
SetBkColor
CreatePen
MoveToEx
LineTo
CreateCompatibleBitmap
SaveDC
CreateSolidBrush
GetStockObject
Rectangle
RestoreDC
GetDeviceCaps
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
SelectPalette
RealizePalette
GetObjectA
kernel32
lstrcmpiA
GetFileSize
SetFileTime
LocalFileTimeToFileTime
GetTimeZoneInformation
HeapAlloc
HeapFree
GetStringTypeW
GetStringTypeA
HeapCreate
GetStdHandle
GetFileType
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
MultiByteToWideChar
FreeEnvironmentStringsA
UnhandledExceptionFilter
RtlUnwind
ExitProcess
GetLocalTime
GetCommandLineA
GetStartupInfoA
GlobalHandle
GlobalCompact
GlobalReAlloc
GetCurrentDirectoryA
_llseek
FileTimeToLocalFileTime
lstrcmpA
CompareStringA
CompareStringW
SetEnvironmentVariableA
FlushFileBuffers
HeapReAlloc
SetStdHandle
MoveFileExA
GetPrivateProfileStringA
GetTickCount
GetModuleFileNameA
lstrcpyA
IsDBCSLeadByte
FreeLibrary
GetProcAddress
LoadLibraryA
GetVersion
GlobalFree
GlobalUnlock
FreeResource
_lclose
_hwrite
OpenFile
lstrcatA
GetWindowsDirectoryA
GlobalLock
GlobalAlloc
LockResource
SizeofResource
LoadResource
FindResourceA
GetModuleHandleA
GetSystemInfo
SetErrorMode
GetLastError
Sleep
FindClose
FindNextFileA
DeleteFileA
SetFileAttributesA
FindFirstFileA
lstrlenA
WinExec
GetPrivateProfileSectionA
WritePrivateProfileStringA
GetProfileSectionA
WriteProfileStringA
WritePrivateProfileSectionA
WriteProfileSectionA
GetSystemDirectoryA
CreateFileA
FileTimeToDosDateTime
GetCurrentThread
GetFileTime
_lwrite
_lread
DosDateTimeToFileTime
CloseHandle
GetCurrentProcess
SetEndOfFile
SetFilePointer
WriteFile
ReadFile
MoveFileA
GetFileAttributesA
RemoveDirectoryA
SetCurrentDirectoryA
GetDriveTypeA
GetDiskFreeSpaceA
CreateDirectoryA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
advapi32
RegCloseKey
RegDeleteValueA
RegQueryValueExA
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenThreadToken
OpenProcessToken
GetTokenInformation
EqualSid
RegEnumValueA
RegConnectRegistryA
InitializeSecurityDescriptor
RegSetValueExA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
AllocateAndInitializeSid
SetSecurityDescriptorOwner
RegCreateKeyExA
FreeSid
comdlg32
GetSaveFileNameA
GetOpenFileNameA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDList
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 169B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 147KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ