Static task
static1
Behavioral task
behavioral1
Sample
86e20bebf09304100a44abd1c8c40f70_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
86e20bebf09304100a44abd1c8c40f70_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
86e20bebf09304100a44abd1c8c40f70_JaffaCakes118
-
Size
270KB
-
MD5
86e20bebf09304100a44abd1c8c40f70
-
SHA1
6a31a15aeff28de60f4c53f8d02012a9c5c13aaa
-
SHA256
4496ae0818e77c012400915ba77b2789e820478b747e88dbe111c437c44c4497
-
SHA512
7bc82742bc73ef73832f8d05c8f9eaa21d4b3e642e6916e2e2b09f9daca06e5f0754c1805b2203968d87c884cd60e5007ff7e4f062dead3d6d8f1995d81c2945
-
SSDEEP
6144:BVd2LdWLQfpjQ17/advymmzjG7GVhn6pVsGBUrx:7d2RWOpjvd6rzvVNRce
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 86e20bebf09304100a44abd1c8c40f70_JaffaCakes118
Files
-
86e20bebf09304100a44abd1c8c40f70_JaffaCakes118.exe windows:4 windows x86 arch:x86
b473d4d84f8bcdcbc8422f53ea493a49
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RaiseException
HeapAlloc
HeapReAlloc
HeapSize
GetACP
GetOEMCP
GetCPInfo
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
FreeEnvironmentStringsA
VirtualAlloc
TerminateProcess
HeapFree
ExitProcess
MulDiv
GetStringTypeW
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
GetLocaleInfoA
SetStdHandle
GetLocaleInfoW
GetVersion
lstrcatA
GlobalGetAtomNameA
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
RtlUnwind
SetErrorMode
GlobalAddAtomA
GetVersionExA
GetModuleFileNameA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
FlushFileBuffers
SetFilePointer
WriteFile
GetCurrentProcess
GetProcessVersion
GetLastError
SetLastError
lstrcpyA
WritePrivateProfileStringA
GlobalFlags
SetUnhandledExceptionFilter
LCMapStringA
lstrcpynA
GetProcAddress
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
GlobalHandle
GlobalUnlock
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
LocalFree
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
LCMapStringW
GetStringTypeA
lstrcmpA
LoadLibraryA
FreeLibrary
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
CloseHandle
user32
PtInRect
SetWindowTextA
GetDC
ReleaseDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
ClientToScreen
GetClassNameA
ShowWindow
GetSystemMetrics
GetSysColorBrush
CharUpperA
EndDialog
WindowFromPoint
FindWindowA
SetRectEmpty
LoadAcceleratorsA
TranslateAcceleratorA
LoadMenuA
SetMenu
ReuseDDElParam
UnpackDDElParam
IsIconic
BringWindowToTop
SetActiveWindow
IsWindow
SetFocus
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetClientRect
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
ScreenToClient
ScrollWindow
SetScrollInfo
ShowScrollBar
DestroyMenu
InvalidateRect
GetSysColor
SetScrollPos
GetTopWindow
IsWindowEnabled
GetCapture
WinHelpA
GetClassInfoA
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetWindow
GetWindowRect
GetWindowLongA
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetParent
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
MessageBoxA
EnableWindow
SetCursor
ShowOwnedPopups
SendMessageA
PostQuitMessage
ReleaseCapture
LoadCursorA
LoadStringA
LoadIconA
UpdateWindow
SystemParametersInfoA
MapWindowPoints
GetDesktopWindow
IsChild
SetScrollRange
GetScrollPos
PostMessageA
wsprintfA
GetMenu
RegisterClassA
UnregisterClassA
gdi32
CreateBitmap
SetBkColor
GetObjectA
DeleteObject
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
GetClipBox
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetTextColor
ScaleWindowExtEx
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyExA
shell32
DragQueryFileA
DragFinish
comctl32
ImageList_Destroy
ord17
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PACK Size: 144KB - Virtual size: 380KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE