Static task
static1
Behavioral task
behavioral1
Sample
89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
89f1efe44aa74399d7b93354151f308e_JaffaCakes118
-
Size
266KB
-
MD5
89f1efe44aa74399d7b93354151f308e
-
SHA1
ba5aa7db202444db19e2021a2180faf17502c42a
-
SHA256
307ea1f3d838d032c5d5ba4fdbd8abe94fda8b95ee6a07576aedc1d31fa33f72
-
SHA512
c2758957758bdd0393a84b30c0b6f939eca6568003f4e3d4a59f080e44a759ddc9671cb969020324841423246aca5ac92715d1ccc9662b65c896cf33203ee1bf
-
SSDEEP
6144:V8g1k937vbCVl3py+5XB+9rgzUggHaxAOx:V8R9rvbCVW+5x+1gz6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 89f1efe44aa74399d7b93354151f308e_JaffaCakes118
Files
-
89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe windows:4 windows x86 arch:x86
e0095a1d93968e700f1cd59ed46f8dd7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
WantArrows
PrintDlgExA
GetOpenFileNameA
FindTextW
ChooseColorA
GetFileTitleA
FindTextA
ChooseFontW
ChooseColorW
GetFileTitleW
user32
CharUpperA
CharNextA
CallWindowProcA
CallNextHookEx
AdjustWindowRectEx
GetCapture
GetClassInfoA
GetClassLongA
CheckMenuItem
GetClientRect
GetCursorPos
GetDC
GetDlgCtrlID
GetDlgItem
GetFocus
GetForegroundWindow
GetKeyState
ClientToScreen
CreateDialogIndirectParamA
CreateWindowExA
DefWindowProcA
DestroyMenu
DestroyWindow
DispatchMessageA
GetActiveWindow
DrawTextA
EnableMenuItem
EnableWindow
GetClassNameA
EndDialog
wsprintfA
WinHelpA
ValidateRect
UpdateWindow
UnregisterClassA
UnhookWindowsHookEx
TranslateMessage
TabbedTextOutA
SystemParametersInfoA
SetWindowsHookExA
SetWindowTextA
SetWindowPos
SetWindowLongA
SetWindowContextHelpId
SetRect
SetPropA
SetMenuItemBitmaps
SetForegroundWindow
SetFocus
SetCursor
SetActiveWindow
SendMessageA
SendDlgItemMessageA
RemovePropA
ReleaseDC
RegisterWindowMessageA
RegisterClassA
RedrawWindow
PtInRect
PostThreadMessageA
PostQuitMessage
PostMessageA
PeekMessageA
OffsetRect
MoveWindow
ModifyMenuA
MessageBoxA
MessageBeep
MapWindowPoints
MapDialogRect
LoadStringA
LoadIconA
LoadCursorA
LoadBitmapA
IsWindowEnabled
IsWindow
IsIconic
IsChild
GrayStringA
GetWindowTextA
GetWindowPlacement
GetWindowLongA
GetWindowDC
GetWindow
GetTopWindow
GetSystemMetrics
GetSysColorBrush
GetSysColor
GetSubMenu
GetPropA
GetParent
GetNextDlgTabItem
GetNextDlgGroupItem
GetMessagePos
GetMessageA
GetMenuItemID
GetMenuItemCount
GetMenuCheckMarkDimensions
DlgDirListComboBoxA
GetMenu
oledlg
ord8
OleUIPasteSpecialW
oleaut32
GetRecordInfoFromTypeInfo
SysAllocString
SysAllocStringByteLen
SysAllocStringLen
SysFreeString
SysStringLen
VarBstrFromDate
VariantChangeType
VariantClear
VariantCopy
VariantTimeToSystemTime
OleCreateFontIndirect
winspool.drv
ClosePrinter
DeleteFormA
DocumentPropertiesA
OpenPrinterA
comctl32
ord17
FlatSB_SetScrollProp
gdi32
SetViewportOrgEx
SetViewportExtEx
SetTextColor
SetMapMode
SetBkColor
ScaleWindowExtEx
ScaleViewportExtEx
SaveDC
RestoreDC
RemoveFontResourceA
Rectangle
SetWindowExtEx
PtVisible
OffsetViewportOrgEx
LPtoDP
GetWindowExtEx
GetViewportExtEx
GetTextColor
GetStockObject
GetObjectA
GetDeviceCaps
GetClipBox
GetBkColor
ExtTextOutA
ExtCreatePen
Escape
DeleteObject
DeleteDC
DPtoLP
TextOutA
RectVisible
ole32
StringFromCLSID
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
OleUninitialize
OleIsCurrentClipboard
OleInitialize
OleFlushClipboard
CreateILockBytesOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
CoRevokeClassObject
CoRegisterMessageFilter
CoGetClassObject
CoFreeUnusedLibraries
CLSIDFromProgID
CLSIDFromString
kernel32
TlsSetValue
LockFile
LocalFree
LocalAlloc
LoadResource
LoadLibraryA
LeaveCriticalSection
LCMapStringW
LCMapStringA
IsBadCodePtr
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
HeapSize
HeapReAlloc
HeapFree
HeapDestroy
HeapCreate
HeapAlloc
GlobalUnlock
GlobalReAlloc
GlobalLock
GlobalHandle
GlobalGetAtomNameA
GlobalFree
GlobalFlags
GlobalFindAtomA
GlobalDeleteAtom
GlobalAlloc
GlobalAddAtomA
GetVersion
GetTimeZoneInformation
GetThreadLocale
GetTempPathA
GetStringTypeW
GetStringTypeA
GetStartupInfoA
GetShortPathNameA
GetProcessVersion
GetProcAddress
GetOEMCP
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameA
GetFileType
GetFileTime
GetFileAttributesA
GetEnvironmentStringsW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetComputerNameA
GetCommandLineA
GetCPInfo
GetACP
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FormatMessageA
FlushFileBuffers
FindResourceA
FindClose
FileTimeToSystemTime
ExitProcess
EnterCriticalSection
DuplicateHandle
DosDateTimeToFileTime
DeleteFileA
DeleteCriticalSection
TlsGetValue
TlsFree
TlsAlloc
CreateFileA
CompareStringW
CompareStringA
CloseHandle
UnlockFile
VirtualAlloc
VirtualFree
WideCharToMultiByte
WinExec
WritePrivateProfileStringA
lstrcmpA
lstrcmpiA
lstrcpyA
TerminateProcess
SetUnhandledExceptionFilter
SetStdHandle
SetLastError
SetHandleCount
lstrcpynA
lstrlenA
lstrlenW
MulDiv
MultiByteToWideChar
Process32Next
RaiseException
ReadFile
RtlUnwind
SetEndOfFile
SetErrorMode
LockResource
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
LsaGetSystemAccessAccount
Sections
.text Size: 53KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 148KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 35KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ