Static task
static1
Behavioral task
behavioral1
Sample
8ee14f754ae01a1ef3eb663a2297867e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8ee14f754ae01a1ef3eb663a2297867e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8ee14f754ae01a1ef3eb663a2297867e_JaffaCakes118
-
Size
220KB
-
MD5
8ee14f754ae01a1ef3eb663a2297867e
-
SHA1
26688463d2718a364c9cb7af3395c40b97a52857
-
SHA256
060f803691f3655b39126436bb36025a076bf2ea7b4ca6eef73bd8e6dae8d97b
-
SHA512
2726f79af1dff96708c6604d995a426373667f0fed7298f78c2a43b0129d8066ce2a1a6c1aa6cc21a5da771dfb2cc8008b2d78ec5ca8cdb0e85774aba147f7a0
-
SSDEEP
3072:USJwcNv3x8wHOEQjjksieP2p5v9QxBqrPfkasasXxY6PhSdt7AdTj:xNvBfHJijksiea5vySPfka8XxxJEAB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8ee14f754ae01a1ef3eb663a2297867e_JaffaCakes118
Files
-
8ee14f754ae01a1ef3eb663a2297867e_JaffaCakes118.exe windows:4 windows x86 arch:x86
34da91586b2d1b65fca47836084279e0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFindExtensionA
PathFindFileNameA
PathFileExistsA
SHDeleteValueA
winmm
timeSetEvent
timeKillEvent
kernel32
GetCurrentProcess
CreateFileA
SetErrorMode
GetCPInfo
GetOEMCP
HeapFree
HeapAlloc
RaiseException
RtlUnwind
VirtualAlloc
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
GetThreadLocale
GetStdHandle
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetACP
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
SetFilePointer
ReadFile
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedDecrement
GetModuleFileNameW
GlobalFlags
WritePrivateProfileStringA
GlobalFree
GlobalUnlock
FormatMessageA
LocalFree
GetCurrentProcessId
SetLastError
GlobalAddAtomA
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
FindResourceA
LoadResource
LockResource
SizeofResource
GlobalLock
GlobalAlloc
FreeLibrary
GlobalDeleteAtom
lstrlenA
WideCharToMultiByte
CompareStringA
MultiByteToWideChar
InterlockedExchange
GetVersion
GetTickCount
LoadLibraryA
GetProcAddress
CreateMutexA
GetModuleFileNameA
GetModuleHandleA
GetLastError
Sleep
WriteFile
CloseHandle
ExitProcess
lstrcmpA
LoadLibraryW
HeapSize
user32
UnregisterClassA
DestroyMenu
LoadCursorA
GetSysColorBrush
ShowWindow
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetSystemMetrics
GetSysColor
ReleaseDC
GetDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnhookWindowsHookEx
RegisterWindowMessageA
DefWindowProcA
PostQuitMessage
MessageBoxA
DispatchMessageA
TranslateMessage
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
GetWindowTextA
SetWindowTextA
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetMessageA
CreateWindowExA
PostMessageA
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuA
SendMessageA
GetParent
GetFocus
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
ValidateRect
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetCursor
SetWindowsHookExA
CallNextHookEx
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
IsIconic
gdi32
DeleteDC
GetStockObject
ScaleViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
SaveDC
DeleteObject
GetDeviceCaps
CreateBitmap
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegOpenKeyExA
RegDeleteKeyA
RegOpenKeyA
RegCloseKey
RegQueryValueExA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ