Static task
static1
Behavioral task
behavioral1
Sample
8540c4a55b2acc899b5d23eb6f581ee3_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8540c4a55b2acc899b5d23eb6f581ee3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8540c4a55b2acc899b5d23eb6f581ee3_JaffaCakes118
-
Size
100KB
-
MD5
8540c4a55b2acc899b5d23eb6f581ee3
-
SHA1
03cc61dcc9500dbb295e0ec1f2f5f79a6b660b3a
-
SHA256
087e517e9d5b6ef6f845ab985a96bce9a47730d6259ef293497ca51d60883859
-
SHA512
0b51ba227238cfced82195f0a9dd929f0bf3491ff8abb6ca71ddf0c09fc09ddde4f210b9b2a9a699624391869b9fcad845255ae48fea7e1841ca4a466bcb856d
-
SSDEEP
1536:SzxcMP2YfQxJVgux399nGBKMDwgWsrsm94x1Vg98uPGUt8bfgwlSU6bCz2gCzuYU:Sr2AQxEux8tDisuyRPGUt8E4+ktY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8540c4a55b2acc899b5d23eb6f581ee3_JaffaCakes118
Files
-
8540c4a55b2acc899b5d23eb6f581ee3_JaffaCakes118.exe windows:4 windows x86 arch:x86
f8c67d1ef1af3fcf991210a0a2ad9685
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
GetCurrentThreadId
VirtualAlloc
CreateFileA
lstrcpynA
CreateThread
lstrcatA
lstrcmpiA
GetACP
EnterCriticalSection
HeapAlloc
GetTickCount
GetThreadLocale
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetFileAttributesA
GetVersion
GetModuleHandleA
ExitProcess
GetOEMCP
FindResourceA
GetVersionExA
GetProcessHeap
GetStringTypeW
HeapDestroy
CloseHandle
SizeofResource
GetFileType
SetEndOfFile
GetFullPathNameA
GlobalAlloc
VirtualQuery
GetDiskFreeSpaceA
WriteFile
FindFirstFileA
CompareStringA
FreeResource
LocalAlloc
MulDiv
FormatMessageA
LocalReAlloc
GetUserDefaultLCID
GetCPInfo
GetLocaleInfoA
ExitThread
SetHandleCount
InitializeCriticalSection
CreateEventA
GetDateFormatA
SetErrorMode
GetCommandLineA
ResetEvent
GetLocalTime
SetEvent
GetLastError
LoadLibraryExA
LoadLibraryA
GetCurrentThread
GetSystemDefaultLangID
VirtualAllocEx
GetStdHandle
HeapFree
GetFileSize
LocalFree
LockResource
GlobalFindAtomA
GetEnvironmentStrings
RaiseException
lstrcmpA
lstrcpyA
FindClose
GetProcAddress
GetStringTypeA
GetStartupInfoA
EnumCalendarInfoA
GlobalDeleteAtom
ReadFile
Sleep
SetLastError
DeleteCriticalSection
SetFilePointer
VirtualFree
DeleteFileA
MoveFileExA
lstrlenA
GlobalAddAtomA
SetThreadLocale
WideCharToMultiByte
LoadResource
msvcrt
malloc
memmove
calloc
log
memcpy
advapi32
RegLoadKeyA
RegQueryInfoKeyA
RegQueryValueA
RegDeleteKeyA
user32
OffsetRect
ScreenToClient
SetWindowTextA
GetLastActivePopup
CreateIcon
DispatchMessageA
ShowWindow
ReleaseCapture
InvalidateRect
UnregisterClassA
GetClassNameA
InsertMenuA
SetWindowLongW
CharLowerA
DispatchMessageW
SetClipboardData
GetDesktopWindow
GetForegroundWindow
GetCapture
DrawFrameControl
MapVirtualKeyA
DestroyMenu
IsWindow
LoadCursorA
RegisterWindowMessageA
CharUpperBuffA
GetMessagePos
GetCursor
UpdateWindow
EnumChildWindows
GetParent
LoadKeyboardLayoutA
EnumWindows
SetTimer
GetKeyboardLayout
PeekMessageA
ShowOwnedPopups
SetPropA
FillRect
GetTopWindow
DrawEdge
EqualRect
DeleteMenu
IntersectRect
IsRectEmpty
PeekMessageW
GetWindowThreadProcessId
PtInRect
ScrollWindow
RegisterClassA
EndPaint
CreatePopupMenu
GetScrollPos
SetWindowPlacement
wsprintfA
GetFocus
IsIconic
GetWindowDC
SetClassLongA
ChildWindowFromPoint
BeginPaint
IsChild
ReleaseDC
SetMenuItemInfoA
MoveWindow
GetKeyboardType
SetScrollRange
IsWindowUnicode
GetKeyState
GetScrollRange
GetWindowRect
SetRect
IsWindowEnabled
CallWindowProcA
EmptyClipboard
SetParent
RemovePropA
GetMenuStringA
TranslateMDISysAccel
GetClipboardData
DrawTextA
GetSystemMetrics
TrackPopupMenu
GetKeyboardState
SetFocus
MessageBeep
MessageBoxA
GetDCEx
IsDialogMessageA
CallNextHookEx
EnumThreadWindows
InflateRect
DefWindowProcA
AdjustWindowRectEx
DefMDIChildProcA
InsertMenuItemA
GetScrollInfo
DefFrameProcA
GetActiveWindow
GetMenuState
GetIconInfo
DestroyIcon
GetKeyNameTextA
MapWindowPoints
GetSysColorBrush
GetMenuItemInfoA
GetMenu
DrawIconEx
IsDialogMessageW
ShowScrollBar
LoadBitmapA
GetMenuItemID
RedrawWindow
GetClassInfoA
GetPropA
SetCursor
CharNextA
GetWindow
GetSysColor
SendMessageW
FindWindowA
SetWindowLongA
SetCapture
DrawMenuBar
DrawIcon
WindowFromPoint
GetClientRect
GetSubMenu
RemoveMenu
GetWindowLongW
EnableMenuItem
CheckMenuItem
EnableWindow
PostQuitMessage
RegisterClipboardFormatA
SetScrollInfo
TranslateMessage
PostMessageA
DestroyWindow
GetDlgItem
SetScrollPos
GetWindowLongA
GetCursorPos
UnhookWindowsHookEx
GetClassLongA
CreateWindowExA
IsZoomed
SetWindowsHookExA
CharToOemA
SetForegroundWindow
DrawAnimatedRects
SetMenu
DestroyCursor
GetWindowPlacement
OemToCharA
GetSystemMenu
SystemParametersInfoA
GetWindowTextA
OpenClipboard
WaitMessage
ClientToScreen
SetWindowPos
GetKeyboardLayoutNameA
GetKeyboardLayoutList
FrameRect
KillTimer
CharNextW
GetMenuItemCount
ActivateKeyboardLayout
IsWindowVisible
GetDC
CloseClipboard
LoadStringA
LoadIconA
shlwapi
SHQueryValueExA
SHEnumValueA
Sections
CODE Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE