Static task
static1
Behavioral task
behavioral1
Sample
82cae05add46efe11468530edb4b44a4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
82cae05add46efe11468530edb4b44a4_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
82cae05add46efe11468530edb4b44a4_JaffaCakes118
-
Size
684KB
-
MD5
82cae05add46efe11468530edb4b44a4
-
SHA1
89aa17056e5166c044e014728043cb6ec2c7f297
-
SHA256
0be44aa329246814afb5db4201ae00a2bf0d8df6818bf4da7f4d0d3554d06ce5
-
SHA512
ad03db29235d714ac2733ba434e111ce2995b23131d392ae5afebe05c31c26398fba10cd67874c0aa21b44a5b08000a55761c5f434b949ed71fbad295d5e14d1
-
SSDEEP
12288:Ep/LaOaJ3YICQkuT1BXMyMWy2o0kVBb6LTFWzIxY7mn:2FaJ30XuT1BcyMpTB6LTFA6n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 82cae05add46efe11468530edb4b44a4_JaffaCakes118
Files
-
82cae05add46efe11468530edb4b44a4_JaffaCakes118.exe windows:4 windows x86 arch:x86
87bb37fabd6d3f979d9cfbfe82d7c1bf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
RegisterClassA
GetClipboardSequenceNumber
ScreenToClient
DefWindowProcW
GetForegroundWindow
MessageBoxA
GetProcessDefaultLayout
DestroyWindow
DefWindowProcA
SetCaretPos
UnregisterClassA
GetLastActivePopup
ArrangeIconicWindows
GetClassInfoW
CreateWindowExW
RegisterClassExA
SetDebugErrorLevel
SetWindowLongA
SetClipboardViewer
DdeQueryStringA
ShowWindow
DdeCreateStringHandleA
DdeInitializeA
AnyPopup
wvsprintfA
SetActiveWindow
advapi32
RegCreateKeyExW
InitiateSystemShutdownA
RegEnumKeyExA
DuplicateToken
RegEnumKeyW
RegCreateKeyExA
RegLoadKeyA
RegCloseKey
RegCreateKeyW
CryptVerifySignatureW
CryptReleaseContext
StartServiceA
LookupPrivilegeNameA
RegEnumValueW
RegEnumKeyExW
LookupPrivilegeDisplayNameW
InitializeSecurityDescriptor
RegRestoreKeyA
comctl32
ImageList_SetOverlayImage
ImageList_AddIcon
ImageList_AddMasked
ImageList_Add
ImageList_GetImageRect
ImageList_GetDragImage
CreatePropertySheetPage
ImageList_SetFilter
ImageList_Duplicate
InitMUILanguage
DrawStatusTextW
ImageList_EndDrag
ImageList_LoadImageW
ImageList_GetBkColor
ImageList_GetIcon
ImageList_Draw
GetEffectiveClientRect
CreateStatusWindowA
CreateStatusWindow
ImageList_Create
InitCommonControlsEx
DestroyPropertySheetPage
ImageList_GetFlags
ImageList_Replace
ImageList_DrawEx
ImageList_Write
gdi32
SetMiterLimit
GetStockObject
CreateDiscardableBitmap
GetPaletteEntries
ExtFloodFill
RestoreDC
IntersectClipRect
GetBkColor
SetFontEnumeration
DeleteColorSpace
UpdateICMRegKeyW
SetBitmapBits
PaintRgn
StretchBlt
GetCharABCWidthsW
comdlg32
ChooseColorW
GetFileTitleW
FindTextA
kernel32
GetStringTypeExW
EnumSystemLocalesA
GetStringTypeA
MapViewOfFileEx
HeapCreate
WriteConsoleInputW
SetStdHandle
InterlockedExchange
SetEnvironmentVariableW
FreeEnvironmentStringsW
SystemTimeToTzSpecificLocalTime
LCMapStringA
HeapAlloc
GetFileType
IsValidCodePage
GetLocaleInfoA
GetEnvironmentStrings
GetExitCodeThread
HeapDestroy
SetLastError
GetLogicalDriveStringsW
FileTimeToDosDateTime
CompareStringA
WritePrivateProfileSectionW
TlsFree
HeapValidate
CreateProcessA
VirtualFree
GetNamedPipeHandleStateA
TlsSetValue
GetCurrentThreadId
GetUserDefaultLCID
GetPrivateProfileStringW
GetTickCount
IsBadWritePtr
LCMapStringW
VirtualProtect
WaitForSingleObject
UnhandledExceptionFilter
SetFilePointer
SetHandleCount
LoadLibraryA
GetComputerNameW
CompareStringW
LockFileEx
OpenMutexA
GetSystemTimeAsFileTime
lstrcpy
VirtualAlloc
GetLocaleInfoW
TlsAlloc
HeapSize
GetTimeFormatA
RtlUnwind
GlobalGetAtomNameW
GetACP
GetTimeZoneInformation
TlsGetValue
CreateMutexA
TerminateProcess
GetStartupInfoA
LeaveCriticalSection
EnterCriticalSection
GetModuleFileNameW
HeapFree
CreateWaitableTimerA
GetModuleHandleA
GetStartupInfoW
SetEndOfFile
InitializeCriticalSection
GetFileAttributesA
FormatMessageW
GetModuleFileNameA
GetCurrentProcessId
GetVersionExA
WideCharToMultiByte
GetCurrentProcess
CreateSemaphoreW
GetLastError
GetCommandLineA
WriteFile
GetPrivateProfileStringA
WriteConsoleOutputCharacterA
SetConsoleMode
VirtualQuery
GetProcAddress
DeleteCriticalSection
MultiByteToWideChar
GetOEMCP
CloseHandle
GetFileSize
ReadFile
GetSystemInfo
CreateDirectoryExA
GetCPInfo
GetFileAttributesW
GetShortPathNameA
GetCommandLineW
GetEnvironmentStringsW
GetExitCodeProcess
FlushFileBuffers
WriteConsoleOutputW
GetStdHandle
QueryPerformanceCounter
ExitProcess
RaiseException
FreeEnvironmentStringsA
ExpandEnvironmentStringsA
SetEnvironmentVariableA
HeapReAlloc
SetThreadContext
lstrcmpiW
GetCurrencyFormatW
IsValidLocale
GetConsoleScreenBufferInfo
GetDateFormatA
LocalFree
GetStringTypeW
GetCurrentThread
Sections
.text Size: 224KB - Virtual size: 221KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ