Static task
static1
Behavioral task
behavioral1
Sample
ac1f949e3f4d8e59a192778a3ca1f3ed_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ac1f949e3f4d8e59a192778a3ca1f3ed_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ac1f949e3f4d8e59a192778a3ca1f3ed_JaffaCakes118
-
Size
798KB
-
MD5
ac1f949e3f4d8e59a192778a3ca1f3ed
-
SHA1
9c3fb3155be6b891e6a577c57169035365ce4386
-
SHA256
24e03b499a20c8596f3b5b9638bc0b28efd8e8d9f48b104c5d313967e5418e86
-
SHA512
158ce3d21477d1ae2b56032c660dea124c643e93e55432d86eca78c5fea457d1022a079abd84ba522bfe62841bd73564d964999e5ec3aef854d9b535cdc9ad64
-
SSDEEP
12288:1IfGKtyQlYBmF1OU7O0tvlqhuFsXMZVp1CGuAgpw/9/WJAfbpn7/ofp1S3T:1IfGElgDY3bFqMZf1C2gaF/QAJ1D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac1f949e3f4d8e59a192778a3ca1f3ed_JaffaCakes118
Files
-
ac1f949e3f4d8e59a192778a3ca1f3ed_JaffaCakes118.exe windows:4 windows x86 arch:x86
8c13d859124f92779da9db05c3517c61
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetForegroundWindow
ReleaseDC
SetWindowPos
IsWindow
DispatchMessageA
GetDC
GetCursorPos
SendMessageA
GetClientRect
DestroyWindow
UpdateWindow
ShowWindow
EnableWindow
TranslateMessage
GetWindow
EnableMenuItem
RegisterClassA
GetSubMenu
CreateWindowExA
FillRect
SetFocus
PeekMessageA
BeginPaint
KillTimer
DefWindowProcA
GetSystemMetrics
GetWindowRect
ReleaseCapture
CheckMenuItem
SetTimer
GetDlgItem
ScreenToClient
EndDialog
SetDlgItemTextA
MessageBoxA
DialogBoxParamA
GetSysColor
IsWindowVisible
DrawTextA
CallWindowProcA
SetCursor
kernel32
GlobalFree
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
GetFileAttributesA
WaitForSingleObject
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
LocalAlloc
ExpandEnvironmentStringsA
SetErrorMode
FreeEnvironmentStringsW
SetStdHandle
GetTempPathA
WideCharToMultiByte
GetStringTypeA
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
SetEvent
LocalFree
InitializeCriticalSection
FindClose
TlsGetValue
FormatMessageA
SetLastError
GetSystemTime
lstrlenW
GetModuleFileNameW
IsDebuggerPresent
GetVersionExA
GetModuleFileNameA
LoadLibraryExA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
CreateThread
SetUnhandledExceptionFilter
GetTickCount
GetVersion
GetCurrentThreadId
GetCurrentThread
GetCommandLineA
GetCurrentProcessId
GetModuleHandleA
GetLastError
ExitProcess
VirtualAlloc
ResetEvent
GetOEMCP
Sleep
VirtualFree
FindResourceW
UnmapViewOfFile
IsValidCodePage
SizeofResource
InterlockedExchange
GetModuleHandleW
GetACP
lstrcpynA
CloseHandle
ReadFile
SetFilePointer
TlsFree
MapViewOfFile
RaiseException
InterlockedCompareExchange
HeapSize
GetCPInfo
GetCommandLineW
GetEnvironmentStrings
RemoveDirectoryA
GlobalUnlock
GetEnvironmentStringsW
GetThreadLocale
FindNextFileW
LCMapStringA
GetConsoleCP
lstrlenA
HeapCreate
LCMapStringW
InterlockedIncrement
HeapAlloc
CreateFileA
TlsSetValue
GetFileType
CreateEventA
CreateFileW
GetTimeZoneInformation
GetProcAddress
WaitForMultipleObjects
FindFirstFileW
CreateFileMappingA
CompareStringA
FindFirstFileA
CompareStringW
GlobalLock
DeleteFileW
DeleteFileA
CreateDirectoryA
GetFileSize
GetStartupInfoA
LoadLibraryA
FlushFileBuffers
TlsAlloc
QueryPerformanceCounter
FreeLibrary
SetHandleCount
EnterCriticalSection
HeapFree
WriteConsoleW
LeaveCriticalSection
SetEndOfFile
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
GetSystemDirectoryA
Sections
.text Size: 761KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ