Static task
static1
Behavioral task
behavioral1
Sample
8a4f6e10de4f89f43d9a9a4ca67056ed_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8a4f6e10de4f89f43d9a9a4ca67056ed_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8a4f6e10de4f89f43d9a9a4ca67056ed_JaffaCakes118
-
Size
601KB
-
MD5
8a4f6e10de4f89f43d9a9a4ca67056ed
-
SHA1
9db8039d3387e71c54aef58a71338275cdf9120f
-
SHA256
be36ba056ab4bbee5bb73c1961c0608db7b9e3afbd16d8d576b6daa2eff205cd
-
SHA512
27f014fb86bde8afaf72d0bd77c169cb583b04effe9efbec03d13f8320b2e9e13b1b4b774f08a6850d2b4c8e7dc0ac8432f0f5abab329420ea1d91e4acb41f4f
-
SSDEEP
12288:fb3sEcpHbciTEVK1YVR4OjXbs4tBgOo+JCn7RX5:D3N2HAiTEVK1YkOjX32Oo7tX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a4f6e10de4f89f43d9a9a4ca67056ed_JaffaCakes118
Files
-
8a4f6e10de4f89f43d9a9a4ca67056ed_JaffaCakes118.exe windows:4 windows x86 arch:x86
8f55e154aef45807a05b7b90e875a229
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
FtpSetCurrentDirectoryW
RetrieveUrlCacheEntryFileW
comctl32
ImageList_DragLeave
ImageList_BeginDrag
CreateMappedBitmap
ImageList_GetBkColor
ImageList_DragEnter
DrawInsert
CreateToolbar
GetEffectiveClientRect
ImageList_GetImageCount
ImageList_Add
ImageList_GetIconSize
InitCommonControlsEx
ImageList_Draw
ImageList_GetFlags
shell32
InternalExtractIconListW
ShellExecuteEx
SHGetFileInfoW
SHGetDataFromIDListW
user32
VkKeyScanW
InSendMessageEx
PeekMessageA
DdeSetQualityOfService
MenuItemFromPoint
FrameRect
CharUpperW
OemToCharBuffW
IsCharAlphaW
DrawFrameControl
GetMessageA
HideCaret
DdeQueryNextServer
RegisterClassA
EnumDisplaySettingsExA
RegisterDeviceNotificationA
WINNLSGetIMEHotkey
ShowWindow
GetMenuItemInfoA
GetKeyboardLayoutNameW
GetWindowContextHelpId
FlashWindow
WinHelpA
SetClassLongW
IsCharAlphaNumericW
SetDebugErrorLevel
GetWindowPlacement
MsgWaitForMultipleObjectsEx
GetClipboardViewer
LookupIconIdFromDirectory
SetWindowPlacement
CharPrevExA
WINNLSEnableIME
GetMenuItemID
ScreenToClient
RemoveMenu
GetGUIThreadInfo
EnumPropsW
CharUpperBuffA
SetCaretPos
UnloadKeyboardLayout
LoadStringW
DefDlgProcA
DispatchMessageW
DialogBoxIndirectParamA
DestroyAcceleratorTable
DefWindowProcW
AppendMenuA
CharToOemW
RegisterClassExA
DdeGetLastError
LoadKeyboardLayoutA
CharToOemBuffA
GetWindowTextA
ScrollDC
IsCharAlphaNumericA
DrawIcon
GetParent
SwitchDesktop
SetWindowContextHelpId
SetCaretBlinkTime
GetCursorInfo
MapVirtualKeyA
DlgDirListComboBoxA
SetDoubleClickTime
GetWindowTextLengthW
GetWindowInfo
DeleteMenu
CreateWindowExW
BlockInput
MessageBoxIndirectA
MessageBoxExA
DestroyWindow
EnumDesktopsA
UnpackDDElParam
DdeDisconnect
wsprintfA
ModifyMenuA
SystemParametersInfoA
SetKeyboardState
SetWindowsHookW
SendMessageA
DialogBoxParamA
GetClassInfoW
TileChildWindows
DlgDirListComboBoxW
ChangeMenuA
DefWindowProcA
ClientToScreen
TrackPopupMenuEx
CheckRadioButton
GetForegroundWindow
SetDlgItemTextW
OpenIcon
TabbedTextOutW
SetClassLongA
GetSubMenu
MessageBoxA
kernel32
OpenProcess
IsValidLocale
GetEnvironmentStrings
GetComputerNameW
WriteFile
SetEnvironmentVariableA
CreateMutexA
OpenMutexA
SetLastError
GetTickCount
GetCommandLineA
UnhandledExceptionFilter
WriteConsoleW
SetCurrentDirectoryW
TlsAlloc
FreeEnvironmentStringsW
MultiByteToWideChar
WritePrivateProfileStringW
GlobalFree
GetVersionExA
CompareStringW
lstrcmpW
SleepEx
IsBadWritePtr
GetModuleFileNameW
HeapReAlloc
WideCharToMultiByte
GetCurrencyFormatW
ExitThread
GetCommandLineW
GetModuleHandleA
GetStringTypeA
EnumSystemLocalesA
FindNextFileA
EnumSystemCodePagesW
CompareStringA
GetNamedPipeInfo
WriteConsoleOutputAttribute
VirtualQuery
lstrcpynW
GetSystemTimeAsFileTime
GetCompressedFileSizeA
DeleteCriticalSection
VirtualFree
SetStdHandle
GetSystemInfo
LCMapStringW
TlsFree
GetStringTypeExA
AllocConsole
GetStringTypeW
GetACP
GetAtomNameA
HeapFree
GetLocaleInfoA
ConvertDefaultLocale
GetStartupInfoA
GetVolumeInformationA
FlushConsoleInputBuffer
GetLocaleInfoW
AddAtomA
CreateRemoteThread
LCMapStringA
FreeEnvironmentStringsA
GetProfileIntA
HeapAlloc
OutputDebugStringA
GetCurrentProcessId
lstrcmpiA
GetOEMCP
VirtualAlloc
GetDiskFreeSpaceW
GetCPInfo
GetTimeZoneInformation
LocalLock
ExitProcess
GetEnvironmentStringsW
LoadLibraryA
FlushFileBuffers
EnumResourceTypesA
GetLastError
InterlockedIncrement
GetDateFormatA
GetStdHandle
WriteConsoleInputW
HeapSize
GetAtomNameW
HeapCreate
InitializeCriticalSection
RemoveDirectoryA
GetProcAddress
GetLogicalDriveStringsW
ReadConsoleW
GlobalUnfix
SetFilePointer
LeaveCriticalSection
TlsSetValue
SetHandleCount
GetCurrentThread
SetConsoleOutputCP
CloseHandle
GetCurrentDirectoryW
QueryPerformanceCounter
GetProcAddress
FileTimeToSystemTime
GetTimeFormatA
GetStartupInfoW
TerminateProcess
RtlUnwind
GetCurrentProcess
WriteFileEx
SetCriticalSectionSpinCount
DeleteFileW
WritePrivateProfileStringA
GetUserDefaultLCID
GetModuleFileNameA
GetCurrentThreadId
ReadFile
GetFileType
InterlockedExchange
HeapDestroy
EnterCriticalSection
VirtualProtect
TlsGetValue
IsValidCodePage
comdlg32
PrintDlgA
LoadAlterBitmap
PrintDlgW
Sections
.text Size: 193KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 257KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 111KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ