Static task
static1
Behavioral task
behavioral1
Sample
70ec780e008c58f4d5730d8ff73bd84d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
70ec780e008c58f4d5730d8ff73bd84d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
70ec780e008c58f4d5730d8ff73bd84d_JaffaCakes118
-
Size
614KB
-
MD5
70ec780e008c58f4d5730d8ff73bd84d
-
SHA1
052714a744a5acb7177ee87bfdafb330cff20368
-
SHA256
ac6089dc045bf0cb4c2a4c9230a5df4f5edc939b53ba3f4e6f3a7a74fbdb1bd9
-
SHA512
8ffb1257c0f8f493d6e8d065a2be52dbc5d95ba4179a9b2fe47d3e6ddfc82dc767bd8fbfdc4a95ceb100f650dfbd17d9a2131ed2bae7afb8f3b80865b1b5df9c
-
SSDEEP
12288:nGhnMbkHovfFpQrgxhaZQCnh9emZ//3TcQ3oGf6aa3wqR9K:GhnMbzlpQrgiZQChN/rka2wS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 70ec780e008c58f4d5730d8ff73bd84d_JaffaCakes118
Files
-
70ec780e008c58f4d5730d8ff73bd84d_JaffaCakes118.exe windows:4 windows x86 arch:x86
a55af504ec23317ccd87e9523f1f24db
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
HeapFree
ExitProcess
TerminateProcess
RaiseException
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
HeapReAlloc
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
GetStartupInfoA
VirtualFree
VirtualAlloc
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
SetStdHandle
GetLocaleInfoA
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetModuleHandleA
RtlUnwind
GlobalGetAtomNameA
GlobalAddAtomA
GetVersionExA
GetProcessVersion
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
SetErrorMode
SetLastError
MulDiv
LocalFree
GetVersion
lstrcatA
GlobalUnlock
GlobalFree
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetCurrentThread
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
SizeofResource
GetFileTime
GetFileSize
GetFileAttributesA
GetModuleFileNameA
lstrcmpiA
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
FindFirstFileA
FindClose
lstrcpyA
lstrlenA
LoadLibraryA
GetProcAddress
FreeLibrary
SetEndOfFile
UnlockFile
LockFile
CloseHandle
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
CreateDirectoryA
GetLastError
GetCommandLineA
GetTempPathA
GetSystemDirectoryA
FindResourceA
LoadResource
LockResource
HeapCreate
user32
IsDialogMessageA
SetWindowTextA
ShowWindow
GetDC
ReleaseDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadStringA
GetClassNameA
PtInRect
ClientToScreen
GetDesktopWindow
LoadCursorA
GetSysColorBrush
DestroyMenu
FindWindowA
InvalidateRect
SetRectEmpty
LoadAcceleratorsA
TranslateAcceleratorA
ReleaseCapture
LoadMenuA
SetMenu
ReuseDDElParam
UnpackDDElParam
BringWindowToTop
SystemParametersInfoA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
EqualRect
DeferWindowPos
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
ScreenToClient
ScrollWindow
SetScrollInfo
ShowScrollBar
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
IsChild
GetCapture
WinHelpA
RegisterClassA
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetMenu
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
SetPropA
UnhookWindowsHookEx
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetWindow
GetWindowRect
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetParent
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
UnregisterClassA
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
MessageBoxA
SetCursor
ShowOwnedPopups
PostMessageA
PostQuitMessage
CharUpperA
wsprintfA
EnableWindow
IsIconic
GetSystemMetrics
UpdateWindow
GetClassInfoA
SendDlgItemMessageA
GetClientRect
DrawIcon
SendMessageA
LoadIconA
GetPropA
WindowFromPoint
gdi32
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
DeleteObject
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
shell32
DragFinish
SHBrowseForFolderA
SHGetPathFromIDListA
DragQueryFileA
comctl32
ord17
ImageList_Destroy
Sections
.text Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 477KB - Virtual size: 477KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ