Static task
static1
Behavioral task
behavioral1
Sample
70602d96d3a676fd4dc90885e576e2c2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
70602d96d3a676fd4dc90885e576e2c2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
70602d96d3a676fd4dc90885e576e2c2_JaffaCakes118
-
Size
504KB
-
MD5
70602d96d3a676fd4dc90885e576e2c2
-
SHA1
fd02126774d1ebe6f9f50ef34ec8cc940d692fde
-
SHA256
e89453b886e161ab11fa9b9af4a4c589ee75c37530bac4272369c311546c2230
-
SHA512
99f93d1d2741fbf60c02920f2a6a2fe0ae6c13443a296d2b1fa2c9582219fa0addb839bcaf4a74b677499ca95938be39c6eb5cb0f50cd33130e5562c1e42ee0c
-
SSDEEP
12288:lHJU91KlMl4Bksb20QAAG8VPTaNY20cqbV6uRfgEVy:NydSesaP7T8Y2p65V
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 70602d96d3a676fd4dc90885e576e2c2_JaffaCakes118
Files
-
70602d96d3a676fd4dc90885e576e2c2_JaffaCakes118.exe windows:4 windows x86 arch:x86
ae62375dc012738f4d23c30d5f60c370
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetFocus
LoadAcceleratorsA
SetRect
TrackPopupMenu
GetForegroundWindow
GetMenuItemCount
GetSystemMenu
CopyImage
MessageBoxA
InflateRect
RegisterClassExA
KillTimer
CharUpperA
GetWindowDC
DrawFocusRect
LoadStringA
LoadMenuA
SetFocus
EndPaint
OpenClipboard
IsWindowEnabled
LoadCursorA
MessageBeep
SetClassLongA
GetDlgItem
ClientToScreen
GetDCEx
DrawTextExA
GetDesktopWindow
UpdateWindow
DestroyIcon
FillRect
LoadBitmapA
DrawEdge
SetCapture
RegisterClassA
ShowWindow
SetCursor
ValidateRect
SetWindowsHookExA
ModifyMenuA
GetMenuStringA
MapWindowPoints
AppendMenuA
GetSubMenu
RegisterWindowMessageA
OffsetRect
GetCursorPos
DrawIcon
DestroyAcceleratorTable
FindWindowA
BeginPaint
DefWindowProcA
GetSystemMetrics
ScrollWindow
AdjustWindowRectEx
LoadIconA
GetMenuState
EnableWindow
PtInRect
EnableMenuItem
CallNextHookEx
GetWindowPlacement
SetWindowRgn
GetCapture
GetWindowLongA
GetActiveWindow
DrawFrameControl
EnumChildWindows
TranslateMessage
GetMenu
DrawIconEx
IsWindowVisible
LockWindowUpdate
advapi32
FreeSid
StartServiceCtrlDispatcherA
SetSecurityDescriptorDacl
RegCloseKey
InitializeAcl
OpenThreadToken
InitializeSecurityDescriptor
RegOpenKeyA
kernel32
FormatMessageA
DeviceIoControl
FreeEnvironmentStringsW
GetWindowsDirectoryA
LockResource
GetTickCount
GetShortPathNameA
CreateProcessA
HeapCreate
VirtualQuery
FindResourceA
GlobalGetAtomNameA
FindNextFileA
RaiseException
GetPrivateProfileStringA
SetFilePointer
CloseHandle
DeleteCriticalSection
GetCurrentProcessId
EnterCriticalSection
GetOEMCP
GetDateFormatA
CreateDirectoryA
GetCPInfo
GetStartupInfoA
InterlockedExchange
GlobalHandle
GetFileSize
FindClose
IsBadCodePtr
lstrcatA
RemoveDirectoryA
HeapReAlloc
GetLocalTime
InitializeCriticalSection
SetThreadPriority
IsDBCSLeadByte
DeleteFileA
ExitProcess
WaitForSingleObject
LCMapStringW
FlushFileBuffers
GetThreadPriority
GetModuleFileNameW
SetStdHandle
SetHandleCount
WideCharToMultiByte
GetModuleFileNameA
LCMapStringA
GlobalLock
GetCurrentThreadId
ResumeThread
GetVersionExA
TerminateProcess
lstrcmpA
CreateFileA
RtlUnwind
QueryPerformanceCounter
GetExitCodeThread
FreeEnvironmentStringsA
TlsGetValue
LocalReAlloc
GetLastError
InterlockedDecrement
GetThreadLocale
HeapFree
ReadFile
CompareStringA
MulDiv
VirtualAlloc
HeapDestroy
TlsAlloc
lstrcpynA
MultiByteToWideChar
LeaveCriticalSection
lstrcmpiA
SetLastError
CreateThread
lstrcpyA
FreeLibrary
GetStringTypeW
GetVersion
WriteFile
GetEnvironmentStringsW
CopyFileA
TlsFree
SetErrorMode
GetDriveTypeA
IsValidCodePage
HeapAlloc
LocalAlloc
DebugBreak
GetSystemTimeAsFileTime
GetFileType
GetStdHandle
GetCommandLineA
GlobalFindAtomA
GetStringTypeExA
GetLocaleInfoA
GetEnvironmentStrings
IsBadReadPtr
UnhandledExceptionFilter
TlsSetValue
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
LocalFree
InterlockedIncrement
SystemTimeToFileTime
GetStringTypeA
GetProcAddress
SetEvent
CompareStringW
GetTimeZoneInformation
SetEnvironmentVariableA
WritePrivateProfileStringA
GetFileAttributesA
GetModuleHandleA
CreateMutexA
GlobalFree
VirtualFree
LoadLibraryA
GetCurrentProcess
GetACP
Sleep
GetSystemTime
SetUnhandledExceptionFilter
gdi32
SetTextColor
Polyline
GetPaletteEntries
StartPage
GetFontData
GetPolyFillMode
GetViewportExtEx
CloseFigure
CreateEllipticRgn
SetBkMode
GetClipRgn
GetCharWidthA
StretchBlt
RealizePalette
DeleteDC
AbortDoc
GetPixel
Polygon
OffsetWindowOrgEx
CreateICA
PlayEnhMetaFile
ScaleViewportExtEx
ExtTextOutA
SelectObject
PlayMetaFile
RectVisible
CreatePatternBrush
Arc
SetAbortProc
GetWindowOrgEx
GetArcDirection
CreateHatchBrush
CreateDIBitmap
SetBrushOrgEx
GetDeviceCaps
SetPixel
SelectPalette
FillPath
FillRgn
SetTextCharacterExtra
CreateSolidBrush
PolyBezierTo
StartDocA
SetWindowExtEx
SetPixelV
SetRectRgn
CreateHalftonePalette
SetTextJustification
CreateCompatibleBitmap
GetRgnBox
EndDoc
CombineRgn
SelectClipPath
ScaleWindowExtEx
TextOutA
CreateBitmap
GetGlyphOutlineA
SetTextAlign
CreateRectRgn
CreateFontIndirectA
EndPage
SetViewportExtEx
CreatePolygonRgn
MoveToEx
GetTextExtentPoint32A
IntersectClipRect
GetCharABCWidthsA
LineTo
GetStretchBltMode
CreatePenIndirect
GetClipBox
DeleteObject
StrokePath
CreateRectRgnIndirect
BitBlt
GetTextExtentPointA
ExtCreatePen
SetViewportOrgEx
CopyMetaFileA
GetStockObject
comctl32
InitCommonControlsEx
ord17
ImageList_Destroy
oleaut32
LoadTypeLi
shell32
SHFileOperationA
ShellExecuteA
DragFinish
ord155
Sections
.text Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ