Static task
static1
Behavioral task
behavioral1
Sample
5a0448eee598421d781eb8975f604fe0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5a0448eee598421d781eb8975f604fe0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5a0448eee598421d781eb8975f604fe0_JaffaCakes118
-
Size
236KB
-
MD5
5a0448eee598421d781eb8975f604fe0
-
SHA1
f40cbfc578d28d5339852cb096aa3735959c7165
-
SHA256
3dfb3a721c40da5ccf23d9a8315b99d316976aa34b080d30c1e4f1a971c5a77a
-
SHA512
b76eb35a7be0302e4ddc0dcb12b6d09553eeea435c9579670183edc71daae1dd83840d2a4a73b7584b6cb1ca0127dc14233992233697342bdb352fb59a6dbf4f
-
SSDEEP
6144:as2iR0ijrk0Qsus6AS1FAn92fxrLqauhw3lR4h5B4qDR:l2ibrkH54SzAcFebS3kB4YR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5a0448eee598421d781eb8975f604fe0_JaffaCakes118
Files
-
5a0448eee598421d781eb8975f604fe0_JaffaCakes118.exe windows:4 windows x86 arch:x86
23085526d79210e9ccfcfa7228c066ec
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpA
ReadDirectoryChangesW
GetVersionExA
GetLocaleInfoW
GetStartupInfoW
FatalAppExitW
IsValidCodePage
GetFileAttributesW
GetDiskFreeSpaceW
SleepEx
GetVolumeInformationW
GetLongPathNameW
FileTimeToLocalFileTime
GetVolumeInformationA
GetVersion
GetExpandedNameA
IsBadStringPtrW
OpenMutexA
GetDateFormatA
CreateEventA
CopyFileExW
GetLocalTime
SetLocaleInfoW
lstrcmpW
FileTimeToSystemTime
GetCalendarInfoW
GetCurrentThreadId
DisconnectNamedPipe
CreateMutexW
GetNumberFormatW
LoadLibraryExA
EnumCalendarInfoA
GetFileAttributesA
lstrlenA
SetCalendarInfoA
GetHandleInformation
GetShortPathNameW
GetProcAddress
GetStartupInfoA
RaiseException
GetProcessHeap
CreateSemaphoreA
lstrcpynA
ConnectNamedPipe
GetModuleHandleA
CreateDirectoryW
SetEvent
GetStringTypeW
GetNumberFormatA
user32
OpenClipboard
PostMessageA
LoadMenuA
LoadCursorW
UpdateLayeredWindow
MessageBoxW
keybd_event
CharLowerA
RegisterWindowMessageW
PeekMessageW
GetMenuItemRect
GetMenu
LoadImageW
RegisterClassW
GetMessageW
GetMenuState
GetMenuItemID
GetClassInfoA
SendMessageW
CreateDesktopA
UnregisterClassW
SetParent
SetMenu
LoadMenuIndirectW
DestroyCursor
RemoveMenu
SetCapture
CopyIcon
IsChild
MonitorFromWindow
SetWindowTextA
ActivateKeyboardLayout
LoadCursorA
SetWindowRgn
GetKeyboardLayout
LoadImageA
GetScrollPos
GetDCEx
MonitorFromRect
GetWindowRgn
wvsprintfA
mouse_event
GetMenuStringA
MessageBeep
SetDlgItemInt
InsertMenuA
gdi32
CreateFontW
CreateDIBPatternBrushPt
CreateColorSpaceA
SelectBrushLocal
ExtCreateRegion
CreateEllipticRgn
RemoveFontResourceExW
CreatePen
GetEnhMetaFilePixelFormat
CreateDIBPatternBrush
CreateRoundRectRgn
GetRasterizerCaps
CreatePolygonRgn
RemoveFontResourceExA
UpdateICMRegKeyA
DeleteObject
RemoveFontResourceA
SetMetaFileBitsEx
CreateBitmap
RemoveFontResourceW
TranslateCharsetInfo
CreateBitmapIndirect
CreateCompatibleDC
SetEnhMetaFileBits
GetEnhMetaFileW
CreateFontIndirectA
CreateScalableFontResourceW
CreatePolyPolygonRgn
advapi32
CryptContextAddRef
shell32
ExtractIconW
DuplicateIcon
opengl32
glIndexi
glVertex2fv
glMultMatrixf
glGenLists
glTexCoord3dv
glVertex4dv
glColor4dv
glEvalCoord1f
wglGetLayerPaletteEntries
glDebugEntry
glTexGend
glTexCoord3s
glRasterPos2d
glIndexfv
glFinish
glTexEnviv
setupapi
SetupGetMultiSzFieldA
wininet
GopherFindFirstFileW
GetUrlCacheEntryInfoExA
InternetGetCookieExW
ShowCertificate
InternetGetCookieW
SetUrlCacheEntryGroup
InternetConnectW
InternetHangUp
InternetAutodialHangup
InternetConfirmZoneCrossingA
InternetFindNextFileA
FtpOpenFileA
InternetConnectA
FindNextUrlCacheGroup
FindNextUrlCacheContainerA
sqlunirl
_InsertMenuItem_@16
_DispatchMessage_@4
_CharToOemBuff_@12
_DlgDirSelectComboBoxEx_@16
_NDdeShareAdd_@20
_RegisterServiceCtrlHandler_@8
_ReadConsoleInput_@16
_LoadImage_@24
_SHGetPathFromIDList_@8
_ReportEvent_@36
_GetCompressedFileSize_@8
_MessageBoxIndirect_@4
_SetUserObjectInformation_@16
_MapVirtualKeyEx_@12
_OpenSCManager_@12
wsprintf_
Sections
.nJJdMM Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.C Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.T Size: 4KB - Virtual size: 487KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MKL Size: 3KB - Virtual size: 361KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zHsoF Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.icOYG Size: 2KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Jj Size: 5KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.FndsA Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rN Size: 14KB - Virtual size: 239KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zMt Size: 1KB - Virtual size: 430KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ