Static task
static1
Behavioral task
behavioral1
Sample
6a7ee89e8182dddf8c0129fbc7b7883a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6a7ee89e8182dddf8c0129fbc7b7883a_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
6a7ee89e8182dddf8c0129fbc7b7883a_JaffaCakes118
-
Size
149KB
-
MD5
6a7ee89e8182dddf8c0129fbc7b7883a
-
SHA1
4888486f4a8620003b49574c3c13026ddd27a6d2
-
SHA256
d30d6cc4bc1291f73811fc4b4782e0268ffbc354c103649bf690e5c4b54b1f54
-
SHA512
ecff8cf2a1a43ef857c741c2b28428a7ed142fa067b0714734de4940fdee85fb6c9b89da9fc4d569331d7cbd6975ed87d55b533482fd059d3fec78e7a2fa3dbd
-
SSDEEP
3072:RiUyUzclAVXT2p5PVVraoGN0BKMqZ8Nea96IzlIEM1Xz:eUQPnradS5e8jl7Mxz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6a7ee89e8182dddf8c0129fbc7b7883a_JaffaCakes118
Files
-
6a7ee89e8182dddf8c0129fbc7b7883a_JaffaCakes118.exe windows:4 windows x86 arch:x86
e80eca52ac95725e22f4a7875f4e03d2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LockResource
GetVersionExA
WriteConsoleA
DeleteFileW
FreeEnvironmentStringsW
SetStdHandle
GetDateFormatA
HeapReAlloc
Sleep
HeapAlloc
GetModuleFileNameA
LocalAlloc
CreatePipe
MulDiv
GetUserDefaultLCID
ExpandEnvironmentStringsW
SetLastError
GetACP
GetExitCodeProcess
GetModuleFileNameW
CopyFileW
CreateFileA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetLocaleInfoW
ResumeThread
TlsGetValue
CompareStringA
TlsAlloc
EnumSystemLocalesA
GetModuleHandleW
GetTimeFormatA
GetTempPathW
lstrcmpW
lstrlenW
FileTimeToSystemTime
InterlockedCompareExchange
LocalUnlock
GetConsoleMode
LoadLibraryA
CreateProcessW
GetCurrentDirectoryA
HeapSize
GetConsoleCP
WriteConsoleW
GetConsoleOutputCP
GetProcessHeap
GetSystemInfo
EnterCriticalSection
FileTimeToLocalFileTime
ExitProcess
GetTickCount
GetCurrentProcessId
GetFullPathNameW
CreateMutexW
LeaveCriticalSection
TerminateProcess
GetCurrentDirectoryW
WriteFile
LocalFree
GetCurrentThreadId
GlobalSize
SetFileAttributesW
HeapDestroy
GetStringTypeW
InitializeCriticalSection
InterlockedIncrement
MoveFileW
ReadFile
GetCommandLineW
TerminateThread
GetStringTypeA
GetCurrentProcess
WaitForSingleObject
GetFileType
GetCPInfo
FindClose
VirtualProtect
GetLocaleInfoA
VirtualQuery
RtlUnwind
IsBadWritePtr
GetOEMCP
SetHandleCount
SetFilePointer
PeekNamedPipe
VirtualFree
CloseHandle
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStringsW
GetStartupInfoA
InterlockedDecrement
GetDateFormatW
VirtualAlloc
HeapFree
WaitForMultipleObjects
GetEnvironmentStrings
SetCurrentDirectoryW
GetTimeFormatW
lstrcpynW
InterlockedExchange
QueryPerformanceCounter
RaiseException
GetFileAttributesW
GetLastError
GlobalLock
GlobalUnlock
lstrcpyW
LoadResource
HeapCreate
GlobalAlloc
LCMapStringW
GetSystemTimeAsFileTime
GetLongPathNameW
GetCommandLineA
TlsSetValue
LCMapStringA
GetProcAddress
FormatMessageW
LoadLibraryW
lstrcmpiW
FindNextFileW
GetModuleHandleA
SetEvent
GetLocalTime
lstrcatW
WideCharToMultiByte
MultiByteToWideChar
CreateDirectoryW
user32
SetCaretPos
GetFocus
SetDlgItemTextW
SetDlgItemInt
GetMenuStringW
CallNextHookEx
GetWindowTextW
SetWindowLongA
SetWindowPlacement
CreateCursor
PeekMessageW
PostQuitMessage
SetMenu
LoadStringW
SetWindowPos
MessageBeep
MonitorFromWindow
DragDetect
CreateDialogParamW
DispatchMessageW
mouse_event
DestroyWindow
FrameRect
GetParent
SetWindowLongW
IsClipboardFormatAvailable
GetCapture
DrawTextExW
CheckMenuRadioItem
LoadImageW
AppendMenuW
GetMessageW
CreateCaret
GetWindowPlacement
wsprintfW
DrawEdge
EndDeferWindowPos
PostMessageW
CallWindowProcW
SendDlgItemMessageW
RemoveMenu
IsWindow
GetDlgItemInt
GetMenuItemCount
UnhookWindowsHookEx
GetMenuItemID
GetWindowRect
PtInRect
GetDlgItemTextW
SetCapture
GetWindowLongW
DeleteMenu
WindowFromPoint
GetMenu
ModifyMenuW
CharUpperW
ScreenToClient
IsChild
CloseClipboard
InsertMenuW
DeferWindowPos
SetScrollInfo
DrawFocusRect
SetCursor
DestroyIcon
FindWindowW
ShowScrollBar
LoadMenuW
GetMessageA
MoveWindow
GetDC
SetClipboardData
DestroyCaret
EndPaint
DefWindowProcW
GetActiveWindow
CharLowerW
IsDialogMessageW
HideCaret
DrawTextW
SystemParametersInfoW
OpenClipboard
DrawIcon
GetScrollRange
CreateAcceleratorTableW
LoadCursorW
UpdateWindow
GetSysColor
SetScrollPos
TranslateMessage
DestroyMenu
SetWindowTextW
GetKeyState
RegisterClassW
DialogBoxIndirectParamW
RealChildWindowFromPoint
GetClientRect
CallWindowProcA
TrackPopupMenu
RegisterWindowMessageW
IsWindowUnicode
FillRect
DrawFrameControl
SetFocus
DestroyCursor
CreateMenu
EnableWindow
MapWindowPoints
RedrawWindow
ShowWindow
SetScrollRange
TranslateAcceleratorW
EmptyClipboard
BeginDeferWindowPos
SetMenuItemInfoW
ScrollWindow
DialogBoxParamW
ShowCaret
InvalidateRect
EnableMenuItem
RegisterClassExW
GetSystemMetrics
ToAscii
SetParent
IsDialogMessageA
GetCursorPos
InsertMenuItemW
EndDialog
gdi32
CreatePatternBrush
SetTextColor
GetROP2
GetTextExtentPoint32W
EndDoc
EnumFontFamiliesExW
RemoveFontResourceW
CreateFontIndirectW
CreatePen
GetStockObject
CreateCompatibleDC
EndPage
GetTextExtentPointW
CreateCompatibleBitmap
RestoreDC
CreateFontW
Rectangle
GetPixel
MoveToEx
CreateSolidBrush
SetROP2
BitBlt
GetDeviceCaps
AddFontResourceW
OffsetWindowOrgEx
CreateHatchBrush
GetObjectW
DPtoLP
LineTo
SetBrushOrgEx
SelectObject
StartDocW
PatBlt
SetWindowOrgEx
SetBkColor
DeleteObject
DeleteDC
ExtTextOutW
CreateBitmap
SetTextAlign
GetTextMetricsW
SaveDC
SetBkMode
StartPage
comdlg32
GetSaveFileNameW
ChooseColorW
GetSaveFileNameA
PrintDlgA
GetOpenFileNameA
ReplaceTextA
GetOpenFileNameW
PrintDlgW
FindTextA
ChooseFontW
ReplaceTextW
PageSetupDlgA
FindTextW
ChooseColorA
PageSetupDlgW
GetFileTitleA
ChooseFontA
GetFileTitleW
ole32
StgOpenAsyncDocfileOnIFillLockBytes
WriteClassStm
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 123KB - Virtual size: 371KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ