Static task
static1
Behavioral task
behavioral1
Sample
701283e178d518bc290c71b961cae1c4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
701283e178d518bc290c71b961cae1c4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
701283e178d518bc290c71b961cae1c4_JaffaCakes118
-
Size
170KB
-
MD5
701283e178d518bc290c71b961cae1c4
-
SHA1
a0659e1ab384f71beff339ba47c6a7495e6363c6
-
SHA256
959b41f1e11afc26a29f2fdf45f58457f0fe9b9f6b0b9a9ddf6466d1354e76c0
-
SHA512
fa8a24a4290211899be5d9fdceb2bc650d9c52c2668da53ae18483f48a2a3f0465af8aef315fd67a3d4ec0b683bd747d25e21b4edd5d6beb896f1f97fa31a33f
-
SSDEEP
3072:wGMHTRi4rVHSEL/E72f5c4S6+stESb0JClTfgqOAWWuOO0s+Asy50:wG+7rVyc/Ec5Lvbb08pfgqOMO7sy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 701283e178d518bc290c71b961cae1c4_JaffaCakes118
Files
-
701283e178d518bc290c71b961cae1c4_JaffaCakes118.exe windows:4 windows x86 arch:x86
6efa5f4c6221e661ffd293d4c8a85b96
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CloseClipboard
DrawFrameControl
AppendMenuW
GetDlgCtrlID
LoadImageW
GetSystemMenu
ShowScrollBar
MessageBeep
GetClientRect
GetWindow
DispatchMessageW
DrawTextExW
GetDlgItem
ReleaseDC
RegisterClipboardFormatW
TrackPopupMenu
UnionRect
GetWindowLongW
InvalidateRect
EnableScrollBar
SetScrollPos
mouse_event
FillRect
SystemParametersInfoA
DrawIconEx
PtInRect
IsChild
ClientToScreen
GetMenuDefaultItem
GetClipboardData
IsWindowVisible
IntersectRect
OpenClipboard
IsClipboardFormatAvailable
ShowWindow
MoveWindow
IsIconic
IsCharLowerW
GetKeyNameTextW
SetCursor
SetParent
CreateCaret
RegisterWindowMessageW
CloseWindow
SetCapture
CopyIcon
CallWindowProcW
UpdateWindow
GetClassLongW
CallNextHookEx
EmptyClipboard
WindowFromPoint
GetMenuItemInfoW
IsRectEmpty
GetLastActivePopup
GetKeyState
HideCaret
CopyAcceleratorTableW
GrayStringW
GetSubMenu
LoadMenuW
EnumChildWindows
BringWindowToTop
GetSystemMetrics
GetDC
GetParent
SetActiveWindow
DrawTextW
TabbedTextOutW
DeferWindowPos
SetCursorPos
SetWindowsHookExW
EnableWindow
SystemParametersInfoW
KillTimer
GetMessageW
TranslateMessage
DestroyCursor
GetCursorPos
OffsetRect
EqualRect
SetTimer
IsMenu
IsZoomed
DrawAnimatedRects
SetFocus
LockWindowUpdate
GetDesktopWindow
GetTabbedTextExtentW
GetKeyboardLayout
SetRectEmpty
UnhookWindowsHookEx
EndDeferWindowPos
BeginDeferWindowPos
ReleaseCapture
LoadCursorW
LoadBitmapW
CreateAcceleratorTableW
DrawStateW
GetMenuItemID
CreateIconIndirect
SetForegroundWindow
GetWindowRect
IsWindow
DrawEdge
GetScrollInfo
GetCursor
PeekMessageW
GetSysColorBrush
DrawFocusRect
RedrawWindow
GetWindowTextW
GetForegroundWindow
ScreenToClient
DeleteMenu
FindWindowW
MapVirtualKeyExW
SetWindowLongW
GetMenuItemCount
DestroyCaret
CopyRect
SetClipboardData
CreatePopupMenu
MapVirtualKeyW
GetNextDlgTabItem
SetMenuDefaultItem
DrawIcon
wsprintfW
ShowCaret
SetScrollInfo
SetRect
PostMessageW
MapWindowPoints
GetDCEx
GetMessagePos
GetScrollPos
SetCaretPos
InsertMenuW
DestroyWindow
EnableMenuItem
SetMenu
GetFocus
InflateRect
GetClassNameW
DestroyIcon
GetActiveWindow
SetWindowRgn
GetMenu
GetIconInfo
LoadIconW
SetWindowPos
GetWindowPlacement
SendMessageW
GetSysColor
DestroyAcceleratorTable
CheckMenuItem
GetCapture
GetMenuState
DragDetect
DestroyMenu
gdi32
Rectangle
SetPixelV
GetTextExtentPoint32W
GetBkColor
CreateDIBSection
ole32
CoCreateInstance
DoDragDrop
OleRun
advapi32
RegOpenKeyW
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
RegEnumKeyExW
RegQueryValueExW
RegEnumValueW
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
comctl32
_TrackMouseEvent
ImageList_GetImageCount
ImageList_Add
ImageList_ReplaceIcon
ImageList_GetImageInfo
ImageList_AddMasked
ImageList_LoadImageW
ImageList_GetIcon
PropertySheetW
InitCommonControlsEx
ImageList_Destroy
ImageList_Draw
gdiplus
GdipCreateHBITMAPFromBitmap
GdipCloneImage
kernel32
GetSystemTimeAsFileTime
GetFileAttributesW
QueryDosDeviceA
ResumeThread
GlobalAlloc
LoadLibraryA
lstrlenW
Sleep
GetModuleFileNameW
lstrcpyW
FindFirstFileW
CreateThread
FreeLibrary
InterlockedExchange
GetProcessId
GetLastError
GetNumberFormatW
GlobalSize
InterlockedDecrement
FileTimeToLocalFileTime
MulDiv
GetVersion
GetPrivateProfileStringW
LoadLibraryW
WritePrivateProfileStringW
LockResource
GetPrivateProfileIntW
EnumResourceTypesA
InitializeCriticalSection
GlobalUnlock
FileTimeToSystemTime
GetThreadLocale
GetTickCount
GetVersionExA
lstrcpynW
GlobalFree
LoadLibraryExW
FindFirstChangeNotificationW
GetModuleHandleW
WaitForSingleObject
CloseHandle
ExitProcess
FindNextChangeNotification
WideCharToMultiByte
QueryPerformanceCounter
GetCurrentDirectoryW
InterlockedIncrement
DeleteCriticalSection
FindCloseChangeNotification
MultiByteToWideChar
LocalFree
SetThreadPriority
GlobalLock
GetACP
LoadResource
FindResourceW
DeleteFileW
GetLocaleInfoW
GetCurrentThreadId
SetFileAttributesW
GetProcAddress
GetVersionExW
lstrcmpW
GetLocaleInfoA
FindClose
GetCurrentProcessId
shell32
SHGetMalloc
SHGetDesktopFolder
SHGetPathFromIDListW
SHAppBarMessage
SHGetFileInfoW
SHBrowseForFolderW
SHGetSpecialFolderLocation
DragAcceptFiles
ShellExecuteW
ShellExecuteExW
Shell_NotifyIconW
Sections
.text Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 240KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ