Static task
static1
Behavioral task
behavioral1
Sample
8d6575737670f6e0fb8694c945bdbfa3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8d6575737670f6e0fb8694c945bdbfa3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8d6575737670f6e0fb8694c945bdbfa3_JaffaCakes118
-
Size
302KB
-
MD5
8d6575737670f6e0fb8694c945bdbfa3
-
SHA1
2c203bb457d09da06d389b3105261e79fa416ffc
-
SHA256
2899cde8a4eeaa95988cabd0d052a04ab559c556d3c065f5fcd7bb53feb42b49
-
SHA512
3f39f7af144839c5da879021b3456af389c61bbd15907c47fe53a437f20b2be82e5f83de4f4cf77efe6c5448b1bcdbe95ad4a3626b5b4e3130dc10f329bb6e77
-
SSDEEP
6144:GOuatq9nLtnGR9XACo5TdW+UKaG4JFW/gRVzgUEjRhrviICUI:GO9t6ZnGLX/yZaKP4J02FkrtJI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8d6575737670f6e0fb8694c945bdbfa3_JaffaCakes118
Files
-
8d6575737670f6e0fb8694c945bdbfa3_JaffaCakes118.exe windows:4 windows x86 arch:x86
5603514a94f741560229713b467ec227
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
lstrlenA
lstrcpyA
CreateFileA
LoadLibraryW
GetProcAddress
VirtualAlloc
CopyFileW
BuildCommDCBAndTimeoutsW
SetCurrentDirectoryW
GlobalWire
InterlockedExchange
SetComputerNameA
GetDateFormatA
WideCharToMultiByte
IsBadHugeWritePtr
IsBadStringPtrW
GetComputerNameExA
SetEnvironmentVariableW
PeekConsoleInputA
LocalShrink
CreateToolhelp32Snapshot
TerminateThread
TerminateJobObject
MoveFileExA
GlobalGetAtomNameA
FreeResource
GetSystemDefaultUILanguage
InterlockedDecrement
HeapValidate
CompareStringW
SearchPathA
DisableThreadLibraryCalls
GetCPInfoExA
GetCurrentConsoleFont
GetCommProperties
AddAtomW
QueryPerformanceFrequency
GlobalFree
ExitProcess
MapUserPhysicalPagesScatter
BeginUpdateResourceA
GetBinaryTypeA
WriteConsoleOutputW
ResetWriteWatch
GlobalLock
GetStringTypeA
CommConfigDialogA
WinExec
QueryDosDeviceA
GetFileTime
GetCommModemStatus
TlsAlloc
FindFirstFileExW
UnregisterWait
ExpandEnvironmentStringsA
TerminateProcess
GetEnvironmentStringsA
SetCommState
DisconnectNamedPipe
GetModuleHandleW
GetExitCodeThread
lstrcmpiW
HeapSize
CopyFileExA
GlobalFlags
_lopen
GetLogicalDriveStringsA
GetSystemPowerStatus
FillConsoleOutputCharacterW
SetThreadExecutionState
GetSystemInfo
GenerateConsoleCtrlEvent
GetStdHandle
WaitCommEvent
GlobalReAlloc
HeapCreate
EnumCalendarInfoExW
GetEnvironmentVariableW
CommConfigDialogW
CreatePipe
UnlockFileEx
FindFirstFileA
FreeEnvironmentStringsW
GetVolumeInformationA
GlobalUnWire
ClearCommBreak
GetTimeFormatW
GetSystemTime
SetSystemTime
WriteConsoleW
OpenMutexA
LocalFlags
_llseek
EnumSystemLanguageGroupsA
SetConsoleActiveScreenBuffer
UnhandledExceptionFilter
user32
LoadCursorA
UnhookWinEvent
NotifyWinEvent
GetForegroundWindow
SendIMEMessageExW
GetScrollInfo
DrawTextExA
GetSystemMetrics
ShowCursor
GetMenuState
SetClipboardViewer
FrameRect
InSendMessageEx
CreateWindowExA
DdeGetData
RealGetWindowClassA
SetMenuItemInfoA
DefFrameProcW
DrawMenuBar
RegisterClassA
LoadKeyboardLayoutA
GetClassWord
CharUpperBuffW
GetClassInfoExA
IntersectRect
GetKeyNameTextA
SetWindowRgn
GetParent
EndPaint
ShowOwnedPopups
DdeCmpStringHandles
SetMenuContextHelpId
RemoveMenu
PostMessageA
WinHelpA
DdeQueryNextServer
VkKeyScanW
WindowFromDC
LoadMenuIndirectW
GetQueueStatus
EditWndProc
EnableMenuItem
SetWindowTextA
GetScrollPos
SystemParametersInfoA
SetActiveWindow
IsWindowEnabled
GetClipboardData
DlgDirSelectExW
GetShellWindow
RealGetWindowClass
ReleaseDC
MonitorFromPoint
GetWindowThreadProcessId
MessageBeep
UnregisterClassW
EnumWindowStationsA
GetMessagePos
EnumThreadWindows
AdjustWindowRect
CreateDialogParamA
EnumDisplayDevicesA
TranslateMDISysAccel
TabbedTextOutA
ChangeMenuW
IMPGetIMEW
IsMenu
DdeDisconnectList
SetWindowsHookExW
SetScrollInfo
ShowScrollBar
CreateIconFromResourceEx
GetDesktopWindow
OpenDesktopW
DdeReconnect
MapVirtualKeyExW
wsprintfW
PostThreadMessageW
ScrollDC
CreateDesktopW
GetUserObjectInformationW
CharToOemA
GetWindowInfo
DdeSetQualityOfService
GetDlgItemTextA
GetSubMenu
SendMessageTimeoutA
DdeConnect
GetClassNameW
keybd_event
GetGuiResources
GetTopWindow
RegisterShellHookWindow
gdi32
GetStockObject
advapi32
RegOpenKeyExA
shell32
ExtractAssociatedIconA
DragQueryFileAorW
ExtractIconEx
SHGetFolderPathW
SHPathPrepareForWriteW
SHBrowseForFolderW
ShellHookProc
ExtractAssociatedIconW
SHGetFolderLocation
ExtractAssociatedIconExW
SHBrowseForFolderA
ShellExecuteW
SHBindToParent
SHLoadInProc
CheckEscapesW
SHAppBarMessage
SHFileOperationA
SHFormatDrive
ShellExecuteEx
SHInvokePrinterCommandW
SHGetFolderPathA
Shell_NotifyIconA
DragAcceptFiles
SHGetDesktopFolder
SHGetSpecialFolderPathW
SHInvokePrinterCommandA
SHFreeNameMappings
SHQueryRecycleBinW
SHGetDiskFreeSpaceExW
SHCreateDirectoryExA
SHFileOperationW
SHQueryRecycleBinA
SHGetFileInfoA
ExtractIconW
SHCreateProcessAsUserW
CommandLineToArgvW
DragQueryPoint
ShellAboutW
SHGetDiskFreeSpaceA
Shell_NotifyIconW
SHAddToRecentDocs
ShellExecuteExW
SHGetPathFromIDListA
DragFinish
FindExecutableW
ExtractIconA
SHGetIconOverlayIndexW
SHGetFileInfo
DoEnvironmentSubstA
SHBrowseForFolder
FindExecutableA
ExtractAssociatedIconExA
SHFileOperation
SHEmptyRecycleBinW
shlwapi
StrStrIA
StrStrA
StrRStrIW
StrCmpNW
StrRChrIA
StrChrW
StrChrA
StrStrW
StrRChrA
StrCmpNIA
StrCmpNIW
StrRStrIA
StrChrIW
Sections
.text Size: 290KB - Virtual size: 289KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text3 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text2 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ