Static task
static1
Behavioral task
behavioral1
Sample
8eaf6787a9efa8a5581cbc63ba1906b3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8eaf6787a9efa8a5581cbc63ba1906b3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8eaf6787a9efa8a5581cbc63ba1906b3_JaffaCakes118
-
Size
517KB
-
MD5
8eaf6787a9efa8a5581cbc63ba1906b3
-
SHA1
0d2db2f2ad8d2a2ec47f224e53e38e54341d51e0
-
SHA256
f6f6963ee3ffb1e9787b670f31be37f52c37186fc7b88623099848d6c96802ea
-
SHA512
7bb64bdd852af31363af0afb98c112a9c59ae293cc1a3b3f49ebc51346a85fadc04f40ebab2019a3ad9cd2ee41ae08f68ea3a2d2d157e6245d2db09f917cca68
-
SSDEEP
12288:zAAgBb9s0fMCONMgZoFuJ+2yK0NmNCF+HyFyt9GYHr1iud:TabANBZjIXNmEF+HykiY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8eaf6787a9efa8a5581cbc63ba1906b3_JaffaCakes118
Files
-
8eaf6787a9efa8a5581cbc63ba1906b3_JaffaCakes118.exe windows:4 windows x86 arch:x86
30392dd1e7a0262e688aa422bf3de030
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
LeaveCriticalSection
HeapAlloc
VirtualProtect
lstrcmpiW
GetProcessHeap
EnterCriticalSection
GetModuleHandleW
lstrlenA
DeleteCriticalSection
lstrcmpiW
InterlockedIncrement
VirtualProtect
InterlockedIncrement
DeleteCriticalSection
GetModuleFileNameA
QueryPerformanceCounter
LoadLibraryW
Sleep
InterlockedExchange
GetCurrentThreadId
HeapDestroy
MultiByteToWideChar
HeapDestroy
HeapDestroy
LocalAlloc
InitializeCriticalSection
GetModuleHandleW
InterlockedCompareExchange
GetVersionExA
QueryPerformanceCounter
lstrlenA
LoadLibraryA
GetCurrentThreadId
CreateThread
VirtualAlloc
GetProcessHeap
VirtualProtect
FreeLibrary
DisableThreadLibraryCalls
HeapFree
MultiByteToWideChar
VirtualProtect
InterlockedCompareExchange
GetCurrentProcessId
HeapAlloc
lstrlenA
MultiByteToWideChar
ReadFile
FreeLibrary
InterlockedDecrement
HeapAlloc
GetSystemTimeAsFileTime
lstrcmpiW
lstrlenA
FreeLibrary
GetProcessHeap
InterlockedDecrement
CreateThread
VirtualProtect
ReadFile
VirtualProtect
CreateFileW
LocalFree
user32
MessageBoxW
BeginPaint
GetDlgItem
SetForegroundWindow
SendMessageW
IsWindow
IsWindow
InvalidateRect
wsprintfA
CharNextW
SetDlgItemTextW
DestroyWindow
EndDialog
DispatchMessageW
GetWindowRect
MessageBoxW
LoadCursorW
DefWindowProcW
MessageBoxW
GetDesktopWindow
BeginPaint
SendDlgItemMessageW
GetDC
GetSystemMetrics
GetWindowLongW
MessageBoxW
SetTimer
LoadIconW
ShowWindow
EndDialog
GetSystemMetrics
IsDlgButtonChecked
GetWindowRect
wsprintfA
CharNextW
SendDlgItemMessageW
GetDesktopWindow
SetWindowLongW
CharNextW
LoadCursorW
CharNextW
DefWindowProcW
SetWindowTextW
InvalidateRect
SetWindowTextW
EndDialog
TranslateMessage
GetWindowLongW
ShowWindow
SetWindowPos
GetWindowRect
SetCursor
DefWindowProcW
MessageBoxW
LoadCursorW
BeginPaint
LoadCursorW
PostQuitMessage
EndPaint
GetFocus
KillTimer
DestroyWindow
gdi32
CreateBitmap
SetWindowOrgEx
LineTo
GetWindowOrgEx
RoundRect
GetCurrentObject
CreateCompatibleDC
GetWindowExtEx
CreateRectRgn
CreateFontIndirectA
SetBrushOrgEx
CreateBitmap
Ellipse
SetBkColor
StretchBlt
GetCurrentObject
CreateBitmapIndirect
SetTextColor
RoundRect
BitBlt
RoundRect
SetPixel
SelectObject
GetBkMode
GetBkColor
SetWindowExtEx
Ellipse
BitBlt
CreateDIBSection
SetTextColor
GetBkMode
GetCurrentObject
LineTo
SetPixel
SetBrushOrgEx
SelectObject
CreatePen
PatBlt
CreatePen
BitBlt
SetWindowExtEx
PatBlt
GetPixel
CreateDIBitmap
CombineRgn
GetWindowOrgEx
PatBlt
Ellipse
LineTo
CreateDIBitmap
SetTextColor
GetPixel
CombineRgn
GetCurrentObject
Polygon
StretchBlt
CreateFontA
CreateRectRgn
CreateRectRgn
LineTo
SelectObject
CreateCompatibleDC
BitBlt
CreateBitmapIndirect
GetWindowOrgEx
Sections
.text Size: 500KB - Virtual size: 964KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ