Static task
static1
Behavioral task
behavioral1
Sample
825cd9d2d1e944b7b8386df0b68b3fae_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
825cd9d2d1e944b7b8386df0b68b3fae_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
825cd9d2d1e944b7b8386df0b68b3fae_JaffaCakes118
-
Size
167KB
-
MD5
825cd9d2d1e944b7b8386df0b68b3fae
-
SHA1
33fe4c78c613266b695b04c7187c028f52fe57d7
-
SHA256
6fa1b7f35c1cde4b0285b206883fad3b1353742c77e9aefb9513ed974f06f544
-
SHA512
7f0cc83078b1ffb82f2604333be733752a16bedea7b1459bb54196ece117a90c5e814e553d1a70339de5573e34f936091a3a38a6e9d06bdb92af197951a5867f
-
SSDEEP
3072:owD6a5CA0rhIKGzVYcuRu3q3bunOKyEEbJ8aVhndJ1f4N:opKKgYcuRuHDLEbvhB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 825cd9d2d1e944b7b8386df0b68b3fae_JaffaCakes118
Files
-
825cd9d2d1e944b7b8386df0b68b3fae_JaffaCakes118.exe windows:4 windows x86 arch:x86
ae4a9c104bab4f2cc23d9cb6de0d2927
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CloseClipboard
GetPropA
MsgWaitForMultipleObjects
IsWindowEnabled
GetClipboardData
SetTimer
MoveWindow
GetCursorPos
ShowWindow
IsWindowUnicode
MessageBeep
GetActiveWindow
ReleaseDC
SetWindowLongW
EqualRect
GetDlgItem
GetWindowPlacement
DestroyCursor
GetLastActivePopup
EnumWindows
DrawMenuBar
GetFocus
CharToOemA
SetRect
SendMessageW
GetClassNameA
DrawIcon
GetWindowDC
DefWindowProcA
LoadBitmapA
SetClipboardData
FrameRect
CreateWindowExA
InflateRect
GetWindowTextA
DrawFrameControl
TrackPopupMenu
GetMenu
CharLowerA
IsZoomed
FindWindowA
SetScrollPos
wsprintfA
CallWindowProcA
LoadCursorA
GetKeyboardType
DrawAnimatedRects
CreatePopupMenu
GetScrollInfo
CharUpperBuffA
DrawTextA
GetWindowRect
GetWindowLongW
GetWindowThreadProcessId
SetScrollRange
DeleteMenu
WindowFromPoint
GetKeyboardLayout
CreateIcon
DrawEdge
GetWindowLongA
SetWindowPlacement
FillRect
PostQuitMessage
DestroyIcon
UnhookWindowsHookEx
IsChild
GetParent
DrawIconEx
SetMenu
PtInRect
InvalidateRect
CreateMenu
WaitMessage
IsWindow
GetScrollPos
SetActiveWindow
GetKeyNameTextA
GetKeyState
SetCursor
GetKeyboardLayoutNameA
MapWindowPoints
ClientToScreen
EnableMenuItem
RedrawWindow
EnableScrollBar
SetParent
TranslateMessage
SetMenuItemInfoA
KillTimer
GetMenuStringA
TranslateMDISysAccel
GetSubMenu
SetWindowLongA
GetSystemMenu
GetClassLongA
GetClientRect
ShowScrollBar
RegisterWindowMessageA
GetMenuState
GetKeyboardLayoutList
AdjustWindowRectEx
GetCursor
ScrollWindow
PostMessageA
LoadKeyboardLayoutA
DefMDIChildProcA
IsDialogMessageA
GetDC
UnregisterClassA
IntersectRect
DispatchMessageA
UpdateWindow
RemovePropA
OemToCharA
CharNextA
GetMessagePos
InsertMenuItemA
GetKeyboardState
CheckMenuItem
CharNextW
IsRectEmpty
SetCapture
GetMenuItemInfoA
GetTopWindow
SystemParametersInfoA
IsIconic
CallNextHookEx
EnumChildWindows
SetForegroundWindow
CharLowerBuffA
GetSysColorBrush
SetWindowTextA
GetScrollRange
ShowOwnedPopups
BeginPaint
InsertMenuA
EndPaint
GetCapture
IsWindowVisible
GetMenuItemID
GetDCEx
ActivateKeyboardLayout
GetForegroundWindow
EnableWindow
ChildWindowFromPoint
RegisterClassA
SetWindowsHookExA
MapVirtualKeyA
LoadStringA
MessageBoxA
EnumThreadWindows
GetSysColor
PeekMessageA
EmptyClipboard
GetWindow
ReleaseCapture
PeekMessageW
DestroyWindow
LoadIconA
GetMenuItemCount
DispatchMessageW
GetClassInfoA
DefFrameProcA
SetPropA
GetSystemMetrics
DestroyMenu
GetIconInfo
GetDesktopWindow
SetScrollInfo
kernel32
LocalReAlloc
FindClose
InitializeCriticalSection
GetTickCount
GetCommandLineA
GetEnvironmentStrings
WriteFile
GetCurrentProcess
EnumCalendarInfoA
GetCurrentProcessId
CreateThread
CloseHandle
lstrcpynA
HeapDestroy
lstrcmpiA
HeapAlloc
ExitThread
DeleteFileA
lstrlenA
LoadLibraryA
VirtualFree
Sleep
GetLocaleInfoA
CompareStringA
ResetEvent
GetFullPathNameA
lstrcmpA
LoadResource
GetACP
SetFilePointer
GetVersionExA
SetHandleCount
SetThreadLocale
SetLastError
GetDateFormatA
MoveFileExA
GlobalFindAtomA
FreeLibrary
MoveFileA
FindResourceA
FormatMessageA
GetVersion
LoadLibraryExA
GetCPInfo
LocalFree
GetUserDefaultLCID
SizeofResource
EnterCriticalSection
GlobalAlloc
MulDiv
GlobalAddAtomA
WaitForSingleObject
GetProcessHeap
GetProcAddress
SetEvent
ReadFile
GetStringTypeA
GetLastError
LockResource
VirtualAllocEx
LocalAlloc
GetStartupInfoA
GetModuleHandleA
lstrcatA
VirtualAlloc
GetFileAttributesA
RaiseException
GetStdHandle
VirtualQuery
GetSystemDefaultLangID
WideCharToMultiByte
SetEndOfFile
GetFileType
GetOEMCP
GetDiskFreeSpaceA
ExitProcess
GetModuleFileNameA
GetFileSize
GetThreadLocale
GetStringTypeW
GetLocalTime
SetErrorMode
FreeResource
HeapFree
FindFirstFileA
GetCurrentThreadId
CreateFileA
DeleteCriticalSection
msvcrt
strncmp
wcschr
exit
memcpy
cos
sprintf
Sections
.text Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 7KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE