Static task
static1
Behavioral task
behavioral1
Sample
8e216b0ac601540f654f6fd58856e563_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8e216b0ac601540f654f6fd58856e563_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8e216b0ac601540f654f6fd58856e563_JaffaCakes118
-
Size
53KB
-
MD5
8e216b0ac601540f654f6fd58856e563
-
SHA1
876013f6b1adbfaa106f54e1861fc0a43ba5e2a4
-
SHA256
280a64d0cba1f671e99fc330107584d13ec6c7744aa940d1b3279ffe0e759f6a
-
SHA512
dec4d0fdf47721be26aefed5a1cabac4d329f0f1f31ee173b7a19ba3fc9fd23b04d1334ae520f6ef1c7f969a670380d6dc1d80d2e200c95d3ddd3722ed21eaa7
-
SSDEEP
1536:Dqeg/LLEyFjydVSz5E1p/S2gmNBOcAW7+:Dxg/vDFjydo5E1E2gu11+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e216b0ac601540f654f6fd58856e563_JaffaCakes118
Files
-
8e216b0ac601540f654f6fd58856e563_JaffaCakes118.exe windows:4 windows x86 arch:x86
35289cee08af12456a1e880f674f6ad2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDC
IsDialogMessageW
GetSystemMetrics
EnableMenuItem
MapWindowPoints
DrawTextExW
UnhookWinEvent
SendMessageW
CharUpperW
DestroyIcon
SetPropA
CloseClipboard
SetActiveWindow
MessageBoxW
CheckMenuItem
SetWindowPlacement
KillTimer
MessageBeep
GetSubMenu
FindWindowW
CreateWindowExW
DeleteMenu
CharNextA
GetDlgItem
RegisterClassExW
GetParent
CharLowerW
ReleaseDC
IsIconic
LoadAcceleratorsW
ChildWindowFromPoint
InvalidateRect
GetKeyboardLayout
GetMessageW
LoadCursorW
GetCursorPos
MoveWindow
GetDlgItemTextW
DestroyWindow
PostQuitMessage
CreateDialogParamW
RegisterWindowMessageW
PeekMessageW
ScreenToClient
ShowWindow
BringWindowToTop
LoadImageW
GetMenu
RegisterWindowMessageA
OpenClipboard
DialogBoxParamW
GetDesktopWindow
CharNextW
GetMenuState
EndDialog
SetCapture
GetForegroundWindow
WinHelpW
LoadIconW
SetFocus
GetWindowThreadProcessId
GetDlgCtrlID
DefWindowProcW
LoadStringW
EnableWindow
SetWindowTextA
AdjustWindowRectEx
IsWindow
SetWindowLongW
SetWindowTextW
SetScrollPos
PostMessageW
GetWindowPlacement
GetClientRect
GetSystemMenu
GetFocus
wsprintfW
TranslateAcceleratorW
UpdateWindow
SendDlgItemMessageW
IsClipboardFormatAvailable
DestroyMenu
TranslateMessage
DispatchMessageW
SetCursor
SetWinEventHook
GetWindowTextW
IsDlgButtonChecked
SetDlgItemTextW
GetWindowLongW
UnionRect
kernel32
ExpandEnvironmentStringsW
RemoveDirectoryW
GlobalSize
GetFileSize
CreateFileW
CreateFileA
GetOEMCP
InterlockedExchange
FoldStringW
GetTimeFormatW
SetLastError
GetLocalTime
HeapDestroy
QueryPerformanceCounter
GetTickCount
HeapFree
LoadResource
lstrcmpW
WideCharToMultiByte
lstrcmpiW
GlobalFree
GetLocaleInfoW
GetACP
UnhandledExceptionFilter
GetProcessHeap
HeapSize
lstrcmpiA
GetModuleHandleW
GetDateFormatW
lstrcatW
HeapAlloc
ReadFile
GetUserDefaultLCID
GetFileAttributesW
SizeofResource
GlobalLock
VirtualAlloc
LocalReAlloc
LocalLock
CloseHandle
FindFirstFileW
GetFileInformationByHandle
WaitForSingleObject
ResetEvent
LocalSize
lstrcpyW
TlsGetValue
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
ExitProcess
UnmapViewOfFile
CreateFileMappingW
LocalFree
MapViewOfFile
GetSystemInfo
GetFileType
MulDiv
GetStdHandle
SetFileAttributesW
GetCurrentThreadId
GetEnvironmentStringsW
lstrcpynW
VirtualFree
GetUserDefaultUILanguage
GetCommandLineW
FindClose
DeleteFileW
GetCurrentThread
GetShortPathNameA
GlobalAlloc
LocalAlloc
LockResource
GetLastError
IsBadWritePtr
RtlUnwind
FindResourceExW
SetEndOfFile
GetProcAddress
GetCurrentProcessId
VirtualProtect
GetSystemDirectoryW
HeapReAlloc
GlobalUnlock
LoadLibraryA
GetCommandLineA
FlushFileBuffers
WriteFile
SetThreadLocale
LocalUnlock
SetEvent
DeleteCriticalSection
GetModuleHandleA
FormatMessageW
InitializeCriticalSection
GetStartupInfoA
LCMapStringA
TerminateProcess
CompareStringW
lstrlenW
HeapCreate
SetFilePointer
GetVersion
GetStringTypeW
GetCPInfo
GetCurrentProcess
OpenMutexA
MultiByteToWideChar
gdi32
SetAbortProc
GetDeviceCaps
EndPage
SetMapMode
TextOutW
SetBkMode
SetViewportExtEx
GetTextMetricsW
DeleteDC
LPtoDP
EnumFontsW
GetStockObject
CreateFontIndirectW
AbortDoc
SelectObject
EndDoc
GetTextExtentPoint32W
GetObjectW
DeleteObject
CreateDCW
SetWindowExtEx
GetTextFaceW
StartPage
StartDocW
winspool.drv
GetPrinterDriverW
OpenPrinterW
ClosePrinter
advapi32
RegQueryValueExW
RegCloseKey
RegOpenKeyExA
IsTextUnicode
RegSetValueExW
RegQueryValueExA
RegCreateKeyW
msvcrt
__setusermatherr
??_U@YAPAXI@Z
wcsncmp
_XcptFilter
_vsnwprintf
_snwprintf
_exit
_lock
_cexit
_iob
_c_exit
__getmainargs
_amsg_exit
wcsncpy
_adjust_fdiv
__p__commode
fprintf
localtime
wcstol
__set_app_type
time
_initterm
??1type_info@@UAE@XZ
__p__fmode
isdigit
malloc
fclose
exit
iswctype
_controlfp
?terminate@@YAXXZ
_wtol
_vsnprintf
_acmdln
comdlg32
GetOpenFileNameW
FindTextW
PageSetupDlgW
PrintDlgExW
CommDlgExtendedError
ChooseFontW
ReplaceTextW
GetFileTitleW
GetSaveFileNameW
shell32
DragFinish
DragAcceptFiles
DragQueryFileW
ShellAboutW
comctl32
CreateStatusWindowW
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ