Static task
static1
Behavioral task
behavioral1
Sample
709259ad96e749083aba1eaf3b8fe2fe_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
709259ad96e749083aba1eaf3b8fe2fe_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
709259ad96e749083aba1eaf3b8fe2fe_JaffaCakes118
-
Size
1.9MB
-
MD5
709259ad96e749083aba1eaf3b8fe2fe
-
SHA1
850ad5da6d076b609cd1ed2642acb771e7c4ac0a
-
SHA256
13b7ea345a4605b56a5ab99b7bdb904f8a4395951d2f259deddd790e55587a69
-
SHA512
7cebb76d834596675750676d2976bf177427782893a6a4bbda31a3fe8f97ee4619ac778cbd34d144825fddc1375229beab97a9da0f37a12549834ff6daff57c3
-
SSDEEP
49152:Zh+IdrOOFduoR/BMRzhNFlIrCc/Bjpkx7I18xKQb:ZEIROwdu1lDFlIeaKIGxF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 709259ad96e749083aba1eaf3b8fe2fe_JaffaCakes118
Files
-
709259ad96e749083aba1eaf3b8fe2fe_JaffaCakes118.exe windows:4 windows x86 arch:x86
73386bf3d64aacc4f390f8277f3d3e96
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WritePrivateProfileStringA
GetProcessVersion
SizeofResource
GetCPInfo
GetOEMCP
RtlUnwind
ExitProcess
TerminateProcess
HeapFree
HeapAlloc
RaiseException
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapReAlloc
SetEnvironmentVariableA
SetCurrentDirectoryA
GetStartupInfoA
GetCommandLineA
GetACP
HeapSize
LCMapStringA
LCMapStringW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
CompareStringA
CompareStringW
GetFileType
SetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
GlobalFlags
SetErrorMode
TlsGetValue
GetProfileStringA
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileTime
MulDiv
SetLastError
FreeLibrary
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetModuleHandleA
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
GlobalLock
GlobalAlloc
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
lstrcmpiA
LoadLibraryA
GetProcAddress
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
WriteFile
GetCurrentProcess
DuplicateHandle
lstrcmpA
FileTimeToSystemTime
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
CreateDirectoryA
MoveFileA
SetVolumeLabelA
GetDriveTypeA
GetCurrentDirectoryA
GetFileSize
GetDiskFreeSpaceA
FormatMessageA
LocalFree
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
lstrlenA
CreateProcessA
GetLastError
GetExitCodeProcess
GetTempPathA
GetModuleFileNameA
RemoveDirectoryA
SetFileAttributesA
DeleteFileA
InterlockedIncrement
FindNextFileA
CreateFileA
SetFilePointer
ReadFile
CloseHandle
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
GetFileAttributesA
lstrcpyA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
HeapCreate
user32
ScreenToClient
AdjustWindowRectEx
GetSysColor
MapWindowPoints
UpdateWindow
ClientToScreen
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadStringA
GetClassNameA
PtInRect
GetSysColorBrush
InflateRect
DestroyMenu
InvalidateRect
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
CopyRect
GetDC
ReleaseDC
EndDialog
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetNextDlgTabItem
GetMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
GetLastActivePopup
UnhookWindowsHookEx
GetParent
SetFocus
IsWindowEnabled
ShowWindow
SetWindowPos
SetWindowLongA
GetDlgCtrlID
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
GetWindowLongA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
CharUpperA
IsWindow
PostQuitMessage
UnregisterClassA
HideCaret
ShowCaret
CharToOemBuffA
OemToCharBuffA
wsprintfA
MsgWaitForMultipleObjects
TranslateMessage
DispatchMessageA
MessageBoxA
GetTopWindow
RegisterWindowMessageA
GetCapture
EnableWindow
LoadCursorA
SetCursor
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
PostMessageA
LoadIconA
SendMessageA
PeekMessageA
IsWindowUnicode
CharNextA
DefDlgProcA
DrawFocusRect
ExcludeUpdateRgn
GetFocus
gdi32
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
DeleteObject
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetBkMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
PatBlt
CreateDIBitmap
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
shell32
SHFileOperationA
comctl32
ord17
Sections
.text Size: 188KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ