Static task
static1
Behavioral task
behavioral1
Sample
62703151e34e2eac00d414c9494f363b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
62703151e34e2eac00d414c9494f363b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
62703151e34e2eac00d414c9494f363b_JaffaCakes118
-
Size
648KB
-
MD5
62703151e34e2eac00d414c9494f363b
-
SHA1
79d96b5e94a7f950b17cf3137cacbb6112ecdeac
-
SHA256
1f8089b2506af1c44e5642449c5b48353591377bd2302cfb7a55457ceb687787
-
SHA512
61ddca27e61c1da036bd36d19f1d4a28e7161f984ce2e2b82a36094993eb620eaf7bb18ab6dcf7114ce8bbe9ad6b78b91b365d13c2f5f7b5267e96789f314bca
-
SSDEEP
12288:g7F5pj84gfM7qI5F6tHZto7p7R8BOuCMn7B2MgP:cFifCfv6t7osVCMn7B2Mi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 62703151e34e2eac00d414c9494f363b_JaffaCakes118
Files
-
62703151e34e2eac00d414c9494f363b_JaffaCakes118.exe windows:4 windows x86 arch:x86
cd1ba421fc586057c9391cb3e7cfaa6b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EnumDesktopWindows
LoadAcceleratorsA
SetScrollPos
DdeReconnect
SwitchDesktop
RegisterClassA
GetClipboardSequenceNumber
AnimateWindow
EnableMenuItem
DestroyCaret
WINNLSGetEnableStatus
MessageBoxIndirectA
ActivateKeyboardLayout
DdeQueryNextServer
SetDebugErrorLevel
DdeAddData
GetThreadDesktop
DdeGetLastError
PostMessageA
GetKeyNameTextW
RegisterClassExA
CharToOemBuffA
OemToCharBuffA
IsCharAlphaNumericA
OpenIcon
WINNLSEnableIME
GetWindowDC
GetSysColorBrush
SetClassLongA
FillRect
ToUnicodeEx
EndTask
GetSysColor
SetMenu
GetWindowLongW
BroadcastSystemMessage
CharUpperBuffW
GetWindowContextHelpId
EnumDesktopsW
InsertMenuW
SetWindowContextHelpId
SetPropA
DlgDirSelectExW
CreateAcceleratorTableA
GetDlgCtrlID
BroadcastSystemMessageA
ChangeMenuW
TileWindows
EndPaint
CopyAcceleratorTableW
EnableWindow
GetUserObjectInformationW
GetClassNameW
PostThreadMessageA
GetKeyboardLayoutList
DestroyMenu
SetProcessDefaultLayout
EnumWindowStationsA
CloseWindowStation
LoadStringA
DragObject
GetClipCursor
UnhookWindowsHook
SendMessageTimeoutW
GetMonitorInfoA
TileChildWindows
DdeQueryConvInfo
comctl32
ImageList_Write
ImageList_Duplicate
ImageList_LoadImageW
InitMUILanguage
ImageList_SetBkColor
CreateMappedBitmap
ImageList_SetDragCursorImage
ImageList_AddIcon
ImageList_DragEnter
DestroyPropertySheetPage
ImageList_ReplaceIcon
MakeDragList
ImageList_DragMove
ImageList_Copy
InitCommonControlsEx
GetEffectiveClientRect
kernel32
SetEnvironmentVariableA
CloseHandle
InterlockedIncrement
GetStringTypeExA
FillConsoleOutputAttribute
GetStringTypeW
SetConsoleCtrlHandler
CompareStringW
GetCurrentProcessId
GetNumberFormatA
CompareStringA
HeapDestroy
WriteProfileSectionA
VirtualQuery
FreeEnvironmentStringsW
LoadLibraryA
GetSystemTimeAsFileTime
GetVolumeInformationW
RtlUnwind
SetLastError
SetCurrentDirectoryW
GetConsoleCP
GetEnvironmentStringsW
lstrcmpW
GetCPInfo
GlobalGetAtomNameW
FreeLibrary
GetLocaleInfoW
GetTimeZoneInformation
GetVersionExA
GetStdHandle
GetProcAddress
VirtualFree
GetSystemDefaultLCID
GetDateFormatA
SetThreadAffinityMask
UnhandledExceptionFilter
SetThreadContext
FlushInstructionCache
VirtualAlloc
IsBadWritePtr
FlushFileBuffers
GetEnvironmentStrings
GetConsoleScreenBufferInfo
GetLastError
CreateSemaphoreA
InterlockedDecrement
SetLocaleInfoW
ExitProcess
GetFullPathNameW
GetTickCount
GetUserDefaultLCID
WriteConsoleW
SetUnhandledExceptionFilter
EnumSystemLocalesA
TlsFree
GetMailslotInfo
GetThreadContext
GetLocaleInfoA
GetCurrentThread
HeapFree
GetCommandLineA
GlobalDeleteAtom
GetNamedPipeInfo
ReadConsoleOutputCharacterA
GetProcessAffinityMask
IsValidCodePage
GlobalHandle
IsValidLocale
LocalReAlloc
HeapAlloc
GetTimeFormatA
TlsAlloc
WriteConsoleA
WriteFile
TerminateProcess
FindFirstFileW
UnlockFile
ReadFile
FillConsoleOutputCharacterA
WriteConsoleOutputCharacterA
GetThreadTimes
HeapReAlloc
GetFileType
TlsSetValue
SetStdHandle
GetConsoleMode
GetModuleHandleA
GetSystemTimeAdjustment
GetCurrentThreadId
OpenMutexA
GlobalGetAtomNameA
TlsGetValue
GetPriorityClass
OpenFile
FreeEnvironmentStringsA
OpenFileMappingW
IsDebuggerPresent
CreateMutexA
QueryPerformanceCounter
CreateFileMappingA
GetProcessHeap
WideCharToMultiByte
HeapSize
WaitForDebugEvent
SetHandleCount
SetFilePointer
WritePrivateProfileStructA
GetProfileIntW
GetModuleFileNameW
GetVersionExW
EnterCriticalSection
ReleaseSemaphore
SleepEx
GetStringTypeA
lstrcatA
Sleep
WaitNamedPipeA
EnumDateFormatsExW
GetACP
InitializeCriticalSection
GetSystemInfo
GetCurrentProcess
TransmitCommChar
SetFileTime
HeapCreate
GetWindowsDirectoryW
FlushConsoleInputBuffer
GetStartupInfoA
SetFileAttributesW
LeaveCriticalSection
WaitCommEvent
GlobalFindAtomW
lstrcpynW
GetOEMCP
CreateFileA
GetStartupInfoW
WriteConsoleOutputA
CreateEventW
InterlockedExchange
LCMapStringW
SetConsoleActiveScreenBuffer
DeleteCriticalSection
GetModuleFileNameA
GetStringTypeExW
GetPrivateProfileStringW
MultiByteToWideChar
LCMapStringA
FoldStringA
CopyFileExA
GetCommandLineW
GetConsoleOutputCP
ReadFileEx
Sections
.text Size: 188KB - Virtual size: 185KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ