Static task
static1
Behavioral task
behavioral1
Sample
821699edbc5e2b601ff085fce3c4f8a4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
821699edbc5e2b601ff085fce3c4f8a4_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
821699edbc5e2b601ff085fce3c4f8a4_JaffaCakes118
-
Size
468KB
-
MD5
821699edbc5e2b601ff085fce3c4f8a4
-
SHA1
0d774e46762768e78a608ab1bf939a087dc76ca5
-
SHA256
1741836f6318dd08460ece7228893c4446e2e3c9c4a4b0f61dab4b2f720b5de6
-
SHA512
b139644144fdc3611b7dddf21b4657729d4bb0ab23bc266963fd81d829f4204d365b2eaff47f10e9987fe5e4fcc2f70c45972287a2073896d054b6bd8e80eeb4
-
SSDEEP
6144:D2Zp88XdzYS0aBpqCnXV4othLZD6bcJQFBGoWL1e5SjizwJ+MLglvO6TovUyEpR:K88XdT0YTbLZWBgReoizwtUlW6svUx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 821699edbc5e2b601ff085fce3c4f8a4_JaffaCakes118
Files
-
821699edbc5e2b601ff085fce3c4f8a4_JaffaCakes118.exe windows:4 windows x86 arch:x86
2cfe4ec2f75165e3c68a012a317cae1b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
kernel32
ReleaseMutex
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetProcessVersion
CreateMutexA
InitializeCriticalSection
MulDiv
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GetCPInfo
SetErrorMode
RtlUnwind
GetStartupInfoA
ExitProcess
HeapAlloc
HeapFree
GetOEMCP
GetCurrentProcess
HeapReAlloc
HeapSize
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
GetStringTypeA
GetStringTypeW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
InterlockedExchange
GetCurrentThread
GlobalAlloc
lstrcmpA
GlobalAddAtomA
GetVersion
GlobalGetAtomNameA
GlobalLock
GlobalFindAtomA
GlobalDeleteAtom
LockResource
GlobalUnlock
GlobalFree
FindResourceA
LoadResource
LocalFree
SetLastError
MultiByteToWideChar
InterlockedDecrement
InterlockedIncrement
lstrlenA
lstrcpynA
WideCharToMultiByte
GetCurrentThreadId
GetVersionExA
GetCommandLineA
ExpandEnvironmentStringsA
GetVolumeInformationA
DeviceIoControl
RemoveDirectoryA
MoveFileExA
DeleteFileA
CloseHandle
SetFilePointer
SetEndOfFile
WritePrivateProfileStringA
OpenFile
_lread
_lwrite
_lclose
SetFileAttributesA
CopyFileA
lstrcatA
lstrcpyA
WriteFile
FlushFileBuffers
GetFileSize
ReadFile
FindNextFileA
FindFirstFileA
FindClose
GetFileAttributesA
LoadLibraryA
FreeLibrary
CreateFileA
RaiseException
GetACP
Sleep
CreateProcessA
GetProcAddress
GetModuleHandleA
GetLastError
TerminateProcess
WaitForSingleObject
GetModuleFileNameA
GetShortPathNameA
lstrcmpiA
GetSystemDirectoryA
GetWindowsDirectoryA
user32
GetSysColor
PeekMessageA
AdjustWindowRectEx
MapWindowPoints
SendDlgItemMessageA
IsDialogMessageA
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
LoadBitmapA
SetWindowTextA
SetCursor
GetCursorPos
ValidateRect
GetSysColorBrush
ReleaseDC
GetMenuState
GetClassNameA
PtInRect
ClientToScreen
TabbedTextOutA
DrawTextA
GetMenuCheckMarkDimensions
DestroyMenu
GetDC
GetMenu
GetMenuItemCount
GrayStringA
GetDlgCtrlID
GetKeyState
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
GetWindow
SetWindowLongA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetNextDlgTabItem
EndDialog
GetSystemMetrics
CreateDialogIndirectParamA
GetWindowLongA
GetDlgItem
GetParent
IsWindowEnabled
LoadStringA
EnableWindow
UpdateWindow
ExitWindowsEx
RegisterWindowMessageA
BroadcastSystemMessage
LoadIconA
wsprintfA
SetForegroundWindow
EnumWindows
GetWindowTextA
GetFocus
SetFocus
SendMessageA
IsWindow
LoadCursorA
RegisterClassA
CreateWindowExA
UnregisterClassA
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
KillTimer
PostQuitMessage
SetTimer
DefWindowProcA
PostMessageA
GetClientRect
CopyRect
IsWindowVisible
GetTopWindow
MessageBoxA
GetCapture
WinHelpA
GetClassInfoA
GetSubMenu
GetMenuItemID
SetActiveWindow
GetActiveWindow
SetWindowPos
gdi32
GetStockObject
GetClipBox
SetTextColor
SetBkColor
GetObjectA
CreateBitmap
GetDeviceCaps
DeleteObject
SelectObject
DeleteDC
SaveDC
RestoreDC
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
PtVisible
TextOutA
ExtTextOutA
RectVisible
Escape
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegCreateKeyExA
OpenProcessToken
RegEnumValueA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyA
RegEnumKeyExA
RegQueryValueExA
RegCloseKey
RegDeleteValueA
RegSetValueExA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyExA
RegQueryValueA
shell32
SHFileOperationA
comctl32
ord17
Sections
.text Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�Ye Size: 240KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE