Static task
static1
Behavioral task
behavioral1
Sample
6063bac8c864f2b0d8d2d4c16bd9a69f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6063bac8c864f2b0d8d2d4c16bd9a69f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6063bac8c864f2b0d8d2d4c16bd9a69f_JaffaCakes118
-
Size
405KB
-
MD5
6063bac8c864f2b0d8d2d4c16bd9a69f
-
SHA1
def4126b2596cc1646e5086e9175b8a895043a00
-
SHA256
680873db6ad3f20bf967b94e1c8399032c3d344cda3d31fb8e1fe2d6b9a60c35
-
SHA512
1868d4316338c025f686a4affb5a047df45e1325106573df422f5cc138e250980bae0e85a983f68ccf960b446fffc55c82e8ade694ffb26f366d3c81def6ea3d
-
SSDEEP
6144:GDsiXlI7jgcf51Ss/NBHxMsqGt1WeQouZtqzAQ5BIzU:TiXGgcvSiHGslDN2Q5+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6063bac8c864f2b0d8d2d4c16bd9a69f_JaffaCakes118
Files
-
6063bac8c864f2b0d8d2d4c16bd9a69f_JaffaCakes118.exe windows:4 windows x86 arch:x86
4b597c8630dcbddd785f8c92dcd6ad74
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOEMCP
SetErrorMode
GetFileSize
GetFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
GetCPInfo
ExitProcess
GetFileAttributesA
HeapAlloc
HeapReAlloc
HeapSize
GetACP
GetTimeZoneInformation
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetProcessVersion
GetEnvironmentStrings
GetEnvironmentStringsW
HeapFree
TerminateProcess
GetVersion
GetProcAddress
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sleep
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
FindResourceA
LoadResource
SizeofResource
FreeLibrary
GlobalFindAtomA
GlobalGetAtomNameA
GlobalAddAtomA
GetModuleHandleA
SetLastError
lstrcatA
WritePrivateProfileStringA
GlobalFlags
TlsSetValue
TlsGetValue
LocalReAlloc
LeaveCriticalSection
EnterCriticalSection
GlobalReAlloc
GlobalUnlock
TlsFree
GlobalHandle
TlsAlloc
GlobalFree
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
GetFullPathNameA
SetHandleCount
FindFirstFileA
lstrcpynA
GetWindowsDirectoryA
GetVolumeInformationA
LoadLibraryA
FindClose
lstrcpyA
GetStdHandle
CreateDirectoryA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
GetLastError
LocalFree
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
CloseHandle
GetModuleFileNameA
GetFileType
HeapDestroy
FreeEnvironmentStringsW
InterlockedExchange
GetProfileStringA
user32
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
DefWindowProcA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetTopWindow
CopyRect
GetClientRect
GetForegroundWindow
GetMessagePos
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
GetSysColorBrush
LoadStringA
DestroyMenu
InvalidateRect
GetWindowPlacement
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
GetWindowTextLengthA
SetForegroundWindow
IsIconic
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
GetMenuItemCount
SetWindowTextA
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
ScreenToClient
LoadCursorA
GetCapture
UnhookWindowsHookEx
GetSystemMetrics
CharUpperA
wsprintfA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
SystemParametersInfoA
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
SetCursor
SendMessageA
PostQuitMessage
RegisterWindowMessageA
OffsetRect
IntersectRect
PostMessageA
ClientToScreen
GetWindowTextA
ShowCaret
IsWindowUnicode
CharNextA
InflateRect
DefDlgProcA
DrawFocusRect
ExcludeUpdateRgn
HideCaret
UnregisterClassA
gdi32
CreateBitmap
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetBkColor
SetBkMode
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
IntersectClipRect
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
ExtTextOutA
Escape
TextOutA
GetObjectA
CreateCompatibleDC
BitBlt
CreateDIBitmap
GetTextExtentPointA
PatBlt
DeleteObject
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
shell32
ShellExecuteA
comctl32
ord17
Sections
.text Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 272KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ