Static task
static1
Behavioral task
behavioral1
Sample
8280c0fc95852e066eb2c18f2fb513c2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8280c0fc95852e066eb2c18f2fb513c2_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
8280c0fc95852e066eb2c18f2fb513c2_JaffaCakes118
-
Size
35KB
-
MD5
8280c0fc95852e066eb2c18f2fb513c2
-
SHA1
db2d0731460031c204d7a9d0a05887657e9be749
-
SHA256
9bac1d070595e924c73b0245b8b82aa4daedafc9d3ee058e66421472331520e2
-
SHA512
790febb37dcc903fdda80d5027f13db311693cdc9b80cc68adbcebafe0213877696e94f6c3491489e8ec036696d75333d7c43c09569e6274c208c2a75026a396
-
SSDEEP
768:bOD2y2LDNdL+5PEBQ5envc276s9OsIPwE8Ujg6dSt:bOmLhdCaQsnXUHRjE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8280c0fc95852e066eb2c18f2fb513c2_JaffaCakes118
Files
-
8280c0fc95852e066eb2c18f2fb513c2_JaffaCakes118.exe windows:5 windows x86 arch:x86
85d385e0b2238844e614de2954e56491
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
lstrlenW
lstrcpyW
VirtualAlloc
BindIoCompletionCallback
BuildCommDCBA
CallNamedPipeW
CompareStringW
CopyFileExW
CreateDirectoryA
CreateFileA
CreatePipe
CreateProcessW
CreateTimerQueue
DeleteTimerQueueEx
DisconnectNamedPipe
DnsHostnameToComputerNameA
EnumLanguageGroupLocalesA
EnumResourceLanguagesW
EnumSystemCodePagesA
EnumUILanguagesA
FileTimeToDosDateTime
FindClose
FindResourceA
FindResourceExW
FlushFileBuffers
FoldStringA
FreeEnvironmentStringsW
FreeLibrary
FreeUserPhysicalPages
GetCPInfoExA
GetCalendarInfoA
GetConsoleAliasesLengthW
GetConsoleTitleW
GetDefaultCommConfigW
GetDiskFreeSpaceExA
GetEnvironmentStringsW
GetExitCodeThread
GetFileAttributesExA
GetFileAttributesExW
GetFileAttributesW
GetFullPathNameA
GetLocaleInfoW
GetLogicalDriveStringsA
GetLogicalDriveStringsW
GetLongPathNameW
GetMailslotInfo
GetPrivateProfileSectionW
GetPrivateProfileStructA
GetWindowsDirectoryW
GetShortPathNameA
GetSystemDefaultLCID
GetSystemTimeAdjustment
GetThreadPriority
GetThreadSelectorEntry
GetUserDefaultLangID
HeapValidate
IsSystemResumeAutomatic
LoadResource
LocalCompact
LocalLock
LockFile
Module32Next
MoveFileWithProgressA
OutputDebugStringA
Process32FirstW
PulseEvent
ReadConsoleInputW
ReadConsoleOutputAttribute
ReplaceFile
ResumeThread
RtlUnwind
ScrollConsoleScreenBufferA
SearchPathA
SetCommTimeouts
SetConsoleCP
SetConsoleCursorPosition
SetConsoleTextAttribute
SetEndOfFile
SetFilePointerEx
SetStdHandle
SetSystemPowerState
SetSystemTime
SetTapePosition
SetUnhandledExceptionFilter
SetVolumeLabelA
SetVolumeLabelW
Thread32First
Toolhelp32ReadProcessMemory
UnmapViewOfFile
VerifyVersionInfoW
VirtualProtect
WaitForSingleObject
WaitForSingleObjectEx
WinExec
WriteConsoleInputA
WriteConsoleInputW
WritePrivateProfileStringA
_lclose
GetProfileStringW
CreateFileW
user32
OpenClipboard
OpenDesktopA
OpenInputDesktop
OpenWindowStationA
PeekMessageA
RegisterClassExA
RegisterClassW
RemovePropA
ReplyMessage
SendMessageTimeoutA
SendNotifyMessageA
SetClassWord
SetLayeredWindowAttributes
SetMenuDefaultItem
SetProcessDefaultLayout
SetRectEmpty
SetUserObjectInformationA
ShowCaret
ShowWindowAsync
TranslateAccelerator
WINNLSGetIMEHotkey
WaitForInputIdle
WinHelpA
WindowFromDC
wvsprintfA
OemToCharBuffW
NotifyWinEvent
MsgWaitForMultipleObjects
LookupIconIdFromDirectoryEx
LockSetForegroundWindow
LoadStringW
LoadMenuIndirectA
LoadAcceleratorsA
IsWindowEnabled
IsDialogMessage
IsCharAlphaW
IMPGetIMEW
GrayStringA
GetWindowModuleFileName
GetWindowInfo
GetUpdateRgn
GetTabbedTextExtentA
GetSystemMetrics
GetSubMenu
GetScrollInfo
GetPriorityClipboardFormat
GetParent
GetNextDlgTabItem
GetMessagePos
GetMenuStringW
GetMenuStringA
GetMenuBarInfo
GetKeyNameTextW
GetDesktopWindow
GetCursorPos
GetClassWord
GetClassNameA
GetAsyncKeyState
EnumThreadWindows
EnumDisplaySettingsExW
EnumDisplaySettingsA
EnableMenuItem
DrawStateA
DragDetect
DispatchMessageA
DestroyCursor
DestroyAcceleratorTable
DeregisterShellHookWindow
DefMDIChildProcA
DefFrameProcA
DdeQueryStringW
DdeQueryStringA
DdeCreateDataHandle
DdeAbandonTransaction
CreateIcon
CreateDesktopW
CreateAcceleratorTableW
CloseDesktop
ClipCursor
CheckMenuItem
CharUpperW
CharToOemBuffA
CallWindowProcW
CallWindowProcA
CallNextHookEx
CallMsgFilter
BroadcastSystemMessage
AttachThreadInput
DrawIconEx
advapi32
RegOpenKeyExA
shell32
Shell_NotifyIconW
Shell_NotifyIcon
ShellExecuteW
ShellExecuteExW
ShellExecuteExA
ShellExecuteEx
ShellExecuteA
DoEnvironmentSubstA
DoEnvironmentSubstW
DragQueryFile
DragQueryFileW
ExtractAssociatedIconA
ExtractAssociatedIconExA
ExtractAssociatedIconW
ExtractIconA
ExtractIconEx
ExtractIconExA
ExtractIconExW
FindExecutableA
FindExecutableW
SHAddToRecentDocs
SHChangeNotify
ShellAboutW
SHCreateDirectoryExA
SHCreateDirectoryExW
SHEmptyRecycleBinA
SHFileOperation
SHGetDataFromIDListA
SHGetDataFromIDListW
SHGetDesktopFolder
SHGetDiskFreeSpaceExA
SHGetDiskFreeSpaceExW
SHGetFileInfo
SHGetFileInfoA
SHGetFolderLocation
SHGetFolderPathA
SHGetFolderPathW
SHGetIconOverlayIndexA
SHGetIconOverlayIndexW
SHGetMalloc
SHGetPathFromIDList
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
SHInvokePrinterCommandW
SHIsFileAvailableOffline
SHLoadInProc
SHPathPrepareForWriteW
SHQueryRecycleBinW
ShellAboutA
shlwapi
StrChrA
StrChrIA
StrChrW
StrCmpNA
StrRChrIA
StrRChrIW
StrRStrIA
StrStrIA
StrStrA
Sections
.text Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 236B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ