Static task
static1
Behavioral task
behavioral1
Sample
725fb0b2fa3e8ca2622b8c14d415ce7d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
725fb0b2fa3e8ca2622b8c14d415ce7d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
725fb0b2fa3e8ca2622b8c14d415ce7d_JaffaCakes118
-
Size
832KB
-
MD5
725fb0b2fa3e8ca2622b8c14d415ce7d
-
SHA1
3b12ba4853293271104649df93a0b137471bbc85
-
SHA256
51766873990e1101ad4f7a2ef85134eeca44dae0d43d3886c0340ce0d226a580
-
SHA512
b94cdc1cadee6582d5a4a485d78490711bdc8ae754258051072611e80cb65678184c30c49cd9bbd9923a307a33e7bc1e8e93f4bac2217aa0e4dce703510dc584
-
SSDEEP
12288:RtdyNJ4VlUP8JEBSCPE9TAlSzZJcbSEjHY91skdS4Q+u+h33YxWPhx8Q:RDZVlKzSCPYi+eHS/dS4Q8hNpx8Q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 725fb0b2fa3e8ca2622b8c14d415ce7d_JaffaCakes118
Files
-
725fb0b2fa3e8ca2622b8c14d415ce7d_JaffaCakes118.exe windows:4 windows x86 arch:x86
46a58fceb12a10d2544d605b3bf18172
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetOpenFileNameA
CommDlgExtendedError
oleaut32
LoadTypeLi
user32
ScreenToClient
GetMessagePos
LoadIconA
SetCapture
GetMenu
GetClipboardData
OpenClipboard
DestroyIcon
DrawFocusRect
CheckMenuItem
CreateAcceleratorTableA
DrawEdge
SetMenuItemInfoA
CreatePopupMenu
WindowFromPoint
InvalidateRect
IsWindowEnabled
CharUpperA
LoadAcceleratorsA
LoadImageA
MessageBoxA
FrameRect
SetRect
DrawFrameControl
GetWindowRect
PostThreadMessageA
SetForegroundWindow
SetMenuItemBitmaps
GetWindowThreadProcessId
DefWindowProcA
DestroyWindow
SetMenu
ReleaseDC
ClientToScreen
ShowScrollBar
GetKeyNameTextA
IsIconic
LoadBitmapA
MapDialogRect
SetWindowContextHelpId
CallNextHookEx
InflateRect
TranslateMessage
SetFocus
DispatchMessageA
SetActiveWindow
GetClientRect
GetNextDlgGroupItem
GetWindowTextLengthA
RegisterClassExA
RegisterClassA
SendDlgItemMessageA
TrackPopupMenu
GetMenuStringA
CreateWindowExA
RegisterHotKey
UnionRect
FillRect
GetMenuItemID
GetWindowTextA
IsChild
CopyRect
DestroyCursor
DrawTextA
SetCursor
IsWindow
GetAsyncKeyState
MapWindowPoints
DrawStateA
PtInRect
GetCapture
GetCursorPos
SetParent
GetWindowLongA
TranslateAcceleratorA
RegisterWindowMessageA
GetFocus
ShowWindow
GetMenuItemCount
GetClassNameA
GetWindow
BringWindowToTop
EnableMenuItem
GetSystemMenu
DestroyAcceleratorTable
SetWindowsHookExA
PostQuitMessage
UnregisterHotKey
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
advapi32
RegQueryInfoKeyW
RegisterEventSourceW
InitializeSecurityDescriptor
ReportEventW
DeregisterEventSource
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
gdi32
CreatePalette
CreateDCA
GetNearestPaletteIndex
SelectObject
Rectangle
StretchDIBits
GetTextColor
GetDIBits
SetPolyFillMode
LPtoDP
SetWindowExtEx
GetTextExtentPointA
GetStockObject
GetGlyphOutlineA
GetViewportExtEx
SetPixel
EnumFontFamiliesExA
CreateDIBSection
DeleteObject
Polygon
OffsetClipRgn
EndDoc
GetClipBox
RealizePalette
MoveToEx
GetPaletteEntries
DPtoLP
GetDeviceCaps
SetROP2
GetWindowExtEx
GetRgnBox
RoundRect
CreateBitmap
Escape
GetTextMetricsA
CombineRgn
IntersectClipRect
SelectClipRgn
StretchBlt
CopyMetaFileA
CreateRectRgnIndirect
PtVisible
GetTextAlign
SetViewportExtEx
GetWindowOrgEx
CreatePolygonRgn
SetTextColor
CreateCompatibleDC
RectInRegion
SaveDC
CreateRectRgn
FillRgn
GetTextFaceA
CreateEllipticRgn
GetBkMode
SetTextAlign
GetMapMode
CreateFontA
ScaleWindowExtEx
Pie
CreatePen
DeleteMetaFile
DeleteDC
OffsetRgn
SetViewportOrgEx
EndPage
SetMapMode
PatBlt
GetPixel
ScaleViewportExtEx
GetROP2
BitBlt
CreateDIBitmap
GetObjectA
AbortDoc
RestoreDC
SetPixelV
StartPage
kernel32
UnhandledExceptionFilter
GetSystemInfo
VirtualQuery
FreeEnvironmentStringsA
GetTickCount
HeapDestroy
EnterCriticalSection
InterlockedDecrement
GetLocaleInfoA
MultiByteToWideChar
WriteFile
GetVersionExA
LCMapStringA
LoadLibraryA
InitializeCriticalSection
TlsSetValue
GetEnvironmentStrings
SetUnhandledExceptionFilter
HeapReAlloc
TlsAlloc
RtlUnwind
CompareStringA
VirtualProtect
HeapFree
GetStringTypeA
SetEnvironmentVariableA
SetLastError
InterlockedIncrement
QueryPerformanceCounter
CloseHandle
IsBadReadPtr
FreeEnvironmentStringsW
IsBadWritePtr
GetProcAddress
CreateMutexA
GetModuleHandleA
VirtualAlloc
HeapCreate
HeapValidate
GetCurrentProcessId
TerminateProcess
CompareStringW
GetStdHandle
LCMapStringW
GetCurrentThreadId
GetFileType
FlushFileBuffers
SetStdHandle
GetTimeFormatA
OutputDebugStringA
ExitProcess
GetCPInfo
GetOEMCP
GetCurrentProcess
LeaveCriticalSection
GetStartupInfoA
IsBadCodePtr
GetStringTypeW
DebugBreak
GetACP
GetModuleFileNameA
VirtualFree
WideCharToMultiByte
TlsFree
GetEnvironmentStringsW
GetLastError
HeapAlloc
GetCommandLineA
RaiseException
ReadFile
GetDateFormatA
InterlockedExchange
SetHandleCount
TlsGetValue
SetFilePointer
DeleteCriticalSection
GetTimeZoneInformation
GetSystemTimeAsFileTime
Sections
.text Size: 120KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 476KB - Virtual size: 474KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ