Static task
static1
Behavioral task
behavioral1
Sample
b13eacb56d27cb2d305f49a44b3ad4dd_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b13eacb56d27cb2d305f49a44b3ad4dd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b13eacb56d27cb2d305f49a44b3ad4dd_JaffaCakes118
-
Size
268KB
-
MD5
b13eacb56d27cb2d305f49a44b3ad4dd
-
SHA1
b519cb61f0189ebefe06cf07560a7a6f3a8e3ecc
-
SHA256
a2ebce0435c0812692f04969b8c9ff7f928ee01ab8d7ff4b58d757495b000e9a
-
SHA512
d1bec41a5a12e216365c80b79f3e5fad4007525302b7375144f5cd45c6785f99bef2bd327a66ec9d845e64d4cfbf2b0f11645d80b67e449541316cd2a2a5af37
-
SSDEEP
6144:WxxtuOTGkF5bEcIV37WuTqwCMv6TChnsLX6BlYXBf2kxLemHaxAOx:WxqOTXEfVrWbwCMv6206BlMl9em
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b13eacb56d27cb2d305f49a44b3ad4dd_JaffaCakes118
Files
-
b13eacb56d27cb2d305f49a44b3ad4dd_JaffaCakes118.exe windows:4 windows x86 arch:x86
e0095a1d93968e700f1cd59ed46f8dd7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
WantArrows
PrintDlgExA
GetOpenFileNameA
FindTextW
ChooseColorA
GetFileTitleA
FindTextA
ChooseFontW
ChooseColorW
GetFileTitleW
user32
CharUpperA
CharNextA
CallWindowProcA
CallNextHookEx
AdjustWindowRectEx
GetCapture
GetClassInfoA
GetClassLongA
CheckMenuItem
GetClientRect
GetCursorPos
GetDC
GetDlgCtrlID
GetDlgItem
GetFocus
GetForegroundWindow
GetKeyState
ClientToScreen
CreateDialogIndirectParamA
CreateWindowExA
DefWindowProcA
DestroyMenu
DestroyWindow
DispatchMessageA
GetActiveWindow
DrawTextA
EnableMenuItem
EnableWindow
GetClassNameA
EndDialog
wsprintfA
WinHelpA
ValidateRect
UpdateWindow
UnregisterClassA
UnhookWindowsHookEx
TranslateMessage
TabbedTextOutA
SystemParametersInfoA
SetWindowsHookExA
SetWindowTextA
SetWindowPos
SetWindowLongA
SetWindowContextHelpId
SetRect
SetPropA
SetMenuItemBitmaps
SetForegroundWindow
SetFocus
SetCursor
SetActiveWindow
SendMessageA
SendDlgItemMessageA
RemovePropA
ReleaseDC
RegisterWindowMessageA
RegisterClassA
RedrawWindow
PtInRect
PostThreadMessageA
PostQuitMessage
PostMessageA
PeekMessageA
OffsetRect
MoveWindow
ModifyMenuA
MessageBoxA
MessageBeep
MapWindowPoints
MapDialogRect
LoadStringA
LoadIconA
LoadCursorA
LoadBitmapA
IsWindowEnabled
IsWindow
IsIconic
IsChild
GrayStringA
GetWindowTextA
GetWindowPlacement
GetWindowLongA
GetWindowDC
GetWindow
GetTopWindow
GetSystemMetrics
GetSysColorBrush
GetSysColor
GetSubMenu
GetPropA
GetParent
GetNextDlgTabItem
GetNextDlgGroupItem
GetMessagePos
GetMessageA
GetMenuItemID
GetMenuItemCount
GetMenuCheckMarkDimensions
DlgDirListComboBoxA
GetMenu
oledlg
ord8
OleUIPasteSpecialW
oleaut32
GetRecordInfoFromTypeInfo
SysAllocString
SysAllocStringByteLen
SysAllocStringLen
SysFreeString
SysStringLen
VarBstrFromDate
VariantChangeType
VariantClear
VariantCopy
VariantTimeToSystemTime
OleCreateFontIndirect
winspool.drv
ClosePrinter
DeleteFormA
DocumentPropertiesA
OpenPrinterA
comctl32
ord17
FlatSB_SetScrollProp
gdi32
SetViewportOrgEx
SetViewportExtEx
SetTextColor
SetMapMode
SetBkColor
ScaleWindowExtEx
ScaleViewportExtEx
SaveDC
RestoreDC
RemoveFontResourceA
Rectangle
SetWindowExtEx
PtVisible
OffsetViewportOrgEx
LPtoDP
GetWindowExtEx
GetViewportExtEx
GetTextColor
GetStockObject
GetObjectA
GetDeviceCaps
GetClipBox
GetBkColor
ExtTextOutA
ExtCreatePen
Escape
DeleteObject
DeleteDC
DPtoLP
TextOutA
RectVisible
ole32
StringFromCLSID
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
OleUninitialize
OleIsCurrentClipboard
OleInitialize
OleFlushClipboard
CreateILockBytesOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
CoRevokeClassObject
CoRegisterMessageFilter
CoGetClassObject
CoFreeUnusedLibraries
CLSIDFromProgID
CLSIDFromString
kernel32
TlsSetValue
LockFile
LocalFree
LocalAlloc
LoadResource
LoadLibraryA
LeaveCriticalSection
LCMapStringW
LCMapStringA
IsBadCodePtr
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
HeapSize
HeapReAlloc
HeapFree
HeapDestroy
HeapCreate
HeapAlloc
GlobalUnlock
GlobalReAlloc
GlobalLock
GlobalHandle
GlobalGetAtomNameA
GlobalFree
GlobalFlags
GlobalFindAtomA
GlobalDeleteAtom
GlobalAlloc
GlobalAddAtomA
GetVersion
GetTimeZoneInformation
GetThreadLocale
GetTempPathA
GetStringTypeW
GetStringTypeA
GetStartupInfoA
GetShortPathNameA
GetProcessVersion
GetProcAddress
GetOEMCP
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameA
GetFileType
GetFileTime
GetFileAttributesA
GetEnvironmentStringsW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetComputerNameA
GetCommandLineA
GetCPInfo
GetACP
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FormatMessageA
FlushFileBuffers
FindResourceA
FindClose
FileTimeToSystemTime
ExitProcess
EnterCriticalSection
DuplicateHandle
DosDateTimeToFileTime
DeleteFileA
DeleteCriticalSection
TlsGetValue
TlsFree
TlsAlloc
CreateFileA
CompareStringW
CompareStringA
CloseHandle
UnlockFile
VirtualAlloc
VirtualFree
WideCharToMultiByte
WinExec
WritePrivateProfileStringA
lstrcmpA
lstrcmpiA
lstrcpyA
TerminateProcess
SetUnhandledExceptionFilter
SetStdHandle
SetLastError
SetHandleCount
lstrcpynA
lstrlenA
lstrlenW
MulDiv
MultiByteToWideChar
Process32Next
RaiseException
ReadFile
RtlUnwind
SetEndOfFile
SetErrorMode
LockResource
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
LsaGetSystemAccessAccount
Sections
.text Size: 55KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 146KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ