Static task
static1
Behavioral task
behavioral1
Sample
8826eed61f8d0747b72bd489d662ec59_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8826eed61f8d0747b72bd489d662ec59_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8826eed61f8d0747b72bd489d662ec59_JaffaCakes118
-
Size
206KB
-
MD5
8826eed61f8d0747b72bd489d662ec59
-
SHA1
01d36efe7f1fa0ad7fca5916ca5e089503e22d0b
-
SHA256
c6c3209cc2fd1b395a35bda2100c11729687cf09b256655e443dca15768dd452
-
SHA512
decc2ee6d5fa01b0f2dfd28278c507563ea314c2118f46fa0158d9507e928974609cc6159b8035d9d82c3bd3d9b73e262e69a01af4390f63b0cd2f77b1e276cb
-
SSDEEP
3072:TjbtEyOUnq/f0k3HkNk4JjRzaVbzyh9qLS7wVHFZdWw+:Lyy3q/yk41RuVbGq2cp9c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8826eed61f8d0747b72bd489d662ec59_JaffaCakes118
Files
-
8826eed61f8d0747b72bd489d662ec59_JaffaCakes118.exe windows:1 windows x86 arch:x86
e0a0bb99414583cd757a3f3cc2c16140
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_control87
_outpw
_ismbcsymbol
_mbsupr
_wcsnset
_wperror
_wfindfirsti64
modf
vswprintf
_wfsopen
memmove
_strcmpi
scanf
isprint
_getsystime
log10
islower
_get_heap_handle
_wcsrev
_exit
exit
_wputenv
_wfopen
_wspawnlpe
_lock
_chkesp
_getcwd
clearerr
_wsystem
__getmainargs
_lrotl
_resetstkoflw
_adjust_fdiv
wcsncmp
_ungetch
_wsopen
_isatty
_endthreadex
_fputwchar
fgets
_controlfp
memcpy
floor
puts
__set_app_type
fread
_acmdln
_wutime64
_inpw
strncmp
fwrite
_memccpy
_wspawnvp
_stricoll
wcsstr
strtol
_spawnl
_snwscanf
__setusermatherr
_wgetenv
printf
ldiv
tmpnam
_cwscanf
_except_handler3
__p__fmode
strchr
_utime64
_creat
_wcsupr
_wfullpath
_initterm
_wfdopen
_daylight
_cabs
_filbuf
__p__commode
_chdrive
_mbsinc
_cgetws
sprintf
_setmbcp
cos
_winmajor
exp
_XcptFilter
_mbsninc
tanh
longjmp
_strupr
_time64
_strdate
_strtime
_set_error_mode
towlower
_lseeki64
_mbsnbcpy
_strrev
user32
LoadImageA
SetCapture
EmptyClipboard
GetClassLongA
GetWindowLongA
CheckMenuItem
GetUserObjectSecurity
ClientToScreen
GetSubMenu
RedrawWindow
SetForegroundWindow
DeleteMenu
ScrollWindowEx
DefMDIChildProcA
DefDlgProcA
DefFrameProcA
SetWindowTextA
IsZoomed
RegisterClassA
DestroyIcon
TranslateMessage
ShowWindowAsync
CheckDlgButton
SetMenuItemInfoA
GetClientRect
LoadIconA
EnableWindow
LoadStringA
GetMenuItemID
DestroyWindow
SetTimer
GetDlgItem
EnableMenuItem
ShowWindow
CreateDialogParamA
OffsetRect
UpdateWindow
GetWindowThreadProcessId
SendMessageA
DrawTextA
GetDlgCtrlID
CreateIconIndirect
GetMessageA
KillTimer
DrawIconEx
SetCursor
CallWindowProcA
GetCursorPos
DialogBoxParamA
SetFocus
PostMessageA
GetSysColor
GetParent
SetDlgItemTextA
MapWindowPoints
CreatePopupMenu
DrawMenuBar
RegisterWindowMessageA
DrawEdge
CheckRadioButton
ExitWindowsEx
IntersectRect
CopyRect
GetFocus
MoveWindow
TrackPopupMenuEx
IsDialogMessageA
DeferWindowPos
GetWindow
ChildWindowFromPoint
kernel32
Module32Next
SetProcessWorkingSetSize
VirtualQueryEx
VirtualAlloc
GetOEMCP
GetCurrentThreadId
SetUnhandledExceptionFilter
SizeofResource
GetStartupInfoA
GetCPInfo
InterlockedIncrement
GetCurrentProcess
ResumeThread
InterlockedDecrement
SetErrorMode
GetConsoleOutputCP
UnhandledExceptionFilter
InterlockedExchange
GetThreadContext
ResetEvent
GetCurrentProcessId
DeviceIoControl
GetNumberFormatA
SetHandleCount
FreeEnvironmentStringsW
OpenProcess
CreateProcessA
FileTimeToSystemTime
GlobalMemoryStatus
IsDebuggerPresent
GetLastError
GetProcessHeap
GetFileTime
FormatMessageA
GetStringTypeA
GetStdHandle
LoadLibraryA
lstrcmpiA
HeapFree
ExitProcess
SearchPathA
GetStringTypeW
FindClose
FindResourceA
GlobalAlloc
SetThreadAffinityMask
PulseEvent
GetVersionExA
WideCharToMultiByte
GetSystemDirectoryA
GetDriveTypeA
WaitForSingleObject
GetFileAttributesA
LCMapStringA
HeapAlloc
GlobalAddAtomA
TlsSetValue
GetCurrentDirectoryA
GetACP
QueryPerformanceFrequency
TlsAlloc
HeapSize
IsBadStringPtrA
CreateThread
FreeLibrary
GetEnvironmentStrings
SetEndOfFile
GetModuleHandleA
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 183KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ