Static task
static1
Behavioral task
behavioral1
Sample
8a1c3e6ea6d16330b0726c84120c231e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8a1c3e6ea6d16330b0726c84120c231e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8a1c3e6ea6d16330b0726c84120c231e_JaffaCakes118
-
Size
352KB
-
MD5
8a1c3e6ea6d16330b0726c84120c231e
-
SHA1
3c0680f47be4a20ac8afb824bbe8e204354accc5
-
SHA256
f159a0472805f9a2903802ee26b048f7734b01cf8163f3be559e2717f68fa6f8
-
SHA512
0ac3a0f233cb4dc8fdefe5a435e85abb1771e2f7d89978a5dc2c83054f3d6a509503216662039938b4d874f0ac179833f1caf42050dae62c7d3609df75dd8e82
-
SSDEEP
6144:WFy2Cu5XnW0Dxu84z8KRy6QfsJddtVzPvMUbDv9+Mt4iDVbk2ZPAxe1o:WFy2CMXnW0NsVRy6e8dRQU/v9BjVb3PL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a1c3e6ea6d16330b0726c84120c231e_JaffaCakes118
Files
-
8a1c3e6ea6d16330b0726c84120c231e_JaffaCakes118.exe windows:4 windows x86 arch:x86
61ef4bf0f84ffd41b6124aea14c4782a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
lstrcpyA
GetTickCount
GetVersionExA
GetConsoleKeyboardLayoutNameA
LoadLibraryExA
SignalObjectAndWait
GetThreadLocale
GetThreadPriority
GetCurrentThread
SetComputerNameExW
EnumResourceNamesA
GetTickCount
SetFileShortNameA
SetConsoleTitleA
EscapeCommFunction
GetModuleFileNameA
GetStartupInfoA
RaiseException
Process32Next
ReleaseSemaphore
GetThreadSelectorEntry
ReadFile
GetVolumePathNameA
ReleaseMutex
GetCommandLineA
FlushViewOfFile
GetDllDirectoryA
SetFileAttributesA
FindFirstFileExW
GetVDMCurrentDirectories
GetThreadContext
GetProcessTimes
GetCurrentThreadId
SetFileApisToOEM
VirtualAllocEx
GetCPInfoExA
GetDriveTypeA
GetCommandLineA
FileTimeToLocalFileTime
DeleteFileA
GetDefaultCommConfigA
CreateMutexA
UnmapViewOfFile
WaitForMultipleObjectsEx
DefineDosDeviceA
ReadConsoleInputA
GetConsoleTitleA
GetConsoleOutputCP
GetProcessShutdownParameters
VerifyVersionInfoA
GlobalAddAtomA
RegisterWaitForInputIdle
GetCurrentProcess
ProcessIdToSessionId
GetVersionExA
FindCloseChangeNotification
GetEnvironmentVariableA
OpenMutexA
WriteConsoleA
GetDiskFreeSpaceExA
CreateDirectoryA
GetModuleHandleA
GetUserDefaultUILanguage
FlushFileBuffers
SetProcessWorkingSetSize
DisconnectNamedPipe
WaitForMultipleObjects
MoveFileExA
MoveFileWithProgressA
GetProcessHeaps
GetModuleHandleA
IsDebuggerPresent
OpenWaitableTimerA
LZCopy
GetCommState
AllocConsole
GetEnvironmentStringsA
GetCommMask
RegisterWaitForSingleObjectEx
GetConsoleScreenBufferInfo
GetConsoleMode
ChangeTimerQueueTimer
GetThreadPriorityBoost
WriteProfileSectionA
CopyFileExW
GetLogicalDrives
SystemTimeToFileTime
SetCommMask
OutputDebugStringA
GetCurrentConsoleFont
SetHandleInformation
GetSystemDefaultUILanguage
FreeLibrary
GetDriveTypeA
DuplicateHandle
QueryDosDeviceA
WriteConsoleOutputA
GetPrivateProfileIntA
WaitCommEvent
GetModuleHandleA
FindAtomA
PurgeComm
OpenFileMappingA
AllocConsole
GetCurrentThreadId
ReleaseSemaphore
GetCommMask
WritePrivateProfileSectionA
GetConsoleAliasExesLengthA
WriteConsoleA
PurgeComm
SetFirmwareEnvironmentVariableA
IsBadCodePtr
GlobalUnWire
GetDriveTypeA
DefineDosDeviceA
GetDriveTypeA
EnumResourceLanguagesA
SetUnhandledExceptionFilter
SetConsoleCursorMode
GlobalFlags
SetPriorityClass
GetCurrentProcess
AddConsoleAliasA
GetConsoleFontSize
IsBadReadPtr
WriteConsoleInputA
GetTimeFormatA
WriteConsoleOutputCharacterA
ShowConsoleCursor
GetTempPathA
SetEndOfFile
EnumResourceLanguagesA
WaitForDebugEvent
GetFileAttributesExA
WritePrivateProfileStructA
LocalUnlock
GetSystemPowerStatus
HeapDestroy
DeleteTimerQueueTimer
GetDevicePowerState
GetUserDefaultUILanguage
GetConsoleWindow
FillConsoleOutputCharacterA
GetWindowsDirectoryA
GetStringTypeExW
GetFileSizeEx
GetComPlusPackageInstallStatus
SetCommTimeouts
RequestDeviceWakeup
GetFileAttributesA
GetSystemDirectoryA
GetWindowsDirectoryA
GetComputerNameA
GetVolumePathNamesForVolumeNameA
HeapDestroy
SearchPathA
GetPrivateProfileStringA
GetDiskFreeSpaceExA
GetTimeZoneInformation
UpdateResourceA
GetSystemDefaultLangID
FreeConsole
IsBadStringPtrA
GetSystemDirectoryA
GetVolumeInformationA
GetDiskFreeSpaceA
GetSystemTimes
ReadConsoleA
SetConsoleCtrlHandler
ExitProcess
VerifyVersionInfoA
CreateDirectoryExW
OpenJobObjectA
GetProcessHandleCount
GetProcAddress
EndUpdateResourceA
LocalReAlloc
user32
UnhookWindowsHookEx
GetAltTabInfo
SetSystemMenu
GetUserObjectInformationA
SetLayeredWindowAttributes
IsGUIThread
CreateCaret
DlgDirSelectExA
LoadCursorFromFileW
GetMenuItemInfoA
PostQuitMessage
DlgDirListComboBoxA
OpenWindowStationA
ShowScrollBar
GetActiveWindow
OpenWindowStationA
CreateDialogIndirectParamA
IntersectRect
GetGUIThreadInfo
SetDebugErrorLevel
LoadStringA
FreeDDElParam
EditWndProc
GetCursor
CharPrevExA
SetWindowsHookExW
ScreenToClient
GetRawInputDeviceInfoA
SetDoubleClickTime
GetRawInputDeviceList
RegisterUserApiHook
DefRawInputProc
GetMessagePos
GetSysColorBrush
CharToOemA
AppendMenuA
GrayStringA
SetShellWindowEx
GetRawInputDeviceList
MessageBoxTimeoutW
BroadcastSystemMessageExW
NotifyWinEvent
CharUpperBuffW
UnregisterClassA
GetParent
GetDlgItemTextA
LoadCursorFromFileW
CalcMenuBar
AlignRects
GetAltTabInfoA
SetWindowPlacement
LoadKeyboardLayoutEx
DeviceEventWorker
CharPrevExA
GetClassWord
SetWindowLongA
ReleaseCapture
SetTimer
GetMenuDefaultItem
GetWindowTextA
CreateCaret
DispatchMessageA
LockWindowUpdate
CreateWindowExA
GetWindowRgnBox
OpenDesktopA
BroadcastSystemMessageExW
GetClassNameA
CallMsgFilter
EnumDisplaySettingsExA
SetWindowStationUser
IsCharAlphaA
GetWindowPlacement
DrawTextA
MapVirtualKeyExA
SetMessageQueue
SetClipboardViewer
MapVirtualKeyExW
EndTask
IsChild
ReplyMessage
SendDlgItemMessageA
GetMenuDefaultItem
advapi32
DuplicateToken
Sections
.itext Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 176KB - Virtual size: 443KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ