Static task
static1
Behavioral task
behavioral1
Sample
aebddcdfab9f25dda2f7e7d5a7aca3e9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aebddcdfab9f25dda2f7e7d5a7aca3e9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aebddcdfab9f25dda2f7e7d5a7aca3e9_JaffaCakes118
-
Size
32KB
-
MD5
aebddcdfab9f25dda2f7e7d5a7aca3e9
-
SHA1
1e3c663233ccea0f2b8557912b98ec87a9ec8572
-
SHA256
d99ee6684622fdecf89a4471be1f99424ecd55533eccf32a4ed2e3bf53e26725
-
SHA512
b27bc8adfafcf985cc556ea4a9bb8fbd6d537a550b6bdf2e90b983864ea5443c3a4c176b35d1e363a8f731d1490ad10184d73c3b4e845bbf6ec73c56349639e3
-
SSDEEP
384:vgGMnrsrCuLnUXflgizUrh47LRvvqhnO4nLQ3YDo/BHn4FxdQXqNj0LFNLa/T0ZJ:bTLUyizsnO4fs5Hn4FD2q0Gi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aebddcdfab9f25dda2f7e7d5a7aca3e9_JaffaCakes118
Files
-
aebddcdfab9f25dda2f7e7d5a7aca3e9_JaffaCakes118.exe windows:5 windows x86 arch:x86
e17857348309611c31266ff49390c444
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDeviceCaps
CreateBitmap
GetDCOrgEx
SetViewportOrgEx
CreatePolygonRgn
GetTextExtentPoint32A
DeleteObject
GetPixel
BitBlt
CreateRectRgnIndirect
SetBkMode
SaveDC
LineTo
SelectPalette
SetTextAlign
SetWindowOrgEx
SetViewportExtEx
CreateDIBSection
CreatePen
SetStretchBltMode
SetRectRgn
CreateSolidBrush
CombineRgn
OffsetWindowOrgEx
GetTextExtentPointW
RealizePalette
MoveToEx
SetBkColor
SetWindowExtEx
PatBlt
CreateCompatibleDC
SetMapMode
GetPaletteEntries
EqualRgn
CreateFontIndirectA
StretchBlt
GetTextAlign
GetStockObject
SelectObject
CreateCompatibleBitmap
CreateRectRgn
RestoreDC
GetClipBox
TextOutA
SetTextColor
DeleteDC
user32
GetDC
EqualRect
WaitForInputIdle
InvalidateRect
GetWindowDC
IsMenu
LoadCursorA
SetCursor
GetClipboardData
GetCursorPos
GetWindowThreadProcessId
InflateRect
CharNextA
OffsetRect
IsWindowUnicode
EndPaint
ReleaseCapture
GetAsyncKeyState
GetShellWindow
WaitMessage
InsertMenuW
WindowFromPoint
PtInRect
IntersectRect
UnhookWindowsHookEx
AdjustWindowRectEx
GetFocus
GetActiveWindow
LockWindowUpdate
EnableWindow
IsRectEmpty
SetRect
SystemParametersInfoA
MsgWaitForMultipleObjectsEx
SetMenuDefaultItem
SetForegroundWindow
GetCapture
GetForegroundWindow
CreatePopupMenu
ReleaseDC
InSendMessage
FillRect
RedrawWindow
CheckMenuItem
GetKeyState
GetDoubleClickTime
GetWindowRect
GetSysColorBrush
SendMessageA
GetSysColor
RegisterWindowMessageA
GetWindowLongA
SetFocus
CopyIcon
GetDesktopWindow
SetKeyboardState
GetSubMenu
GetMenuState
CreateIconIndirect
DestroyWindow
SetWindowRgn
ShowScrollBar
SetScrollPos
GetCaretPos
GetParent
BeginPaint
EnumChildWindows
IsWindowEnabled
GetKeyboardState
SetParent
GetMenuItemCount
LoadStringA
SetWindowLongA
MessageBeep
HideCaret
CallNextHookEx
LoadMenuA
GetDlgCtrlID
ShowCaret
GetMenuItemID
SetRectEmpty
EndDialog
ShowWindow
GetMessagePos
SetTimer
SetActiveWindow
SetScrollInfo
IsChild
GetUpdateRect
EnumWindows
GetCursor
GetSystemMenu
ClientToScreen
CloseClipboard
IsWindow
GetClassWord
SendMessageTimeoutA
GetClientRect
CharNextW
RegisterWindowMessageW
MsgWaitForMultipleObjects
GetWindow
MapWindowPoints
EnableMenuItem
ScreenToClient
CopyRect
LoadMenuW
KillTimer
DestroyIcon
GetWindowPlacement
IsWindowVisible
PostMessageW
GetDlgItem
MoveWindow
TranslateMessage
RemoveMenu
SetMenu
SetWindowPos
CreateMenu
IsIconic
UpdateWindow
GetIconInfo
OpenClipboard
InsertMenuA
SetWindowPlacement
DrawEdge
DrawIconEx
GetScrollInfo
GetSystemMetrics
ChildWindowFromPoint
SetCapture
GetProcessWindowStation
DestroyAcceleratorTable
kernel32
HeapDestroy
TerminateProcess
TlsAlloc
LocalAlloc
GetLastError
EnterCriticalSection
InterlockedDecrement
TlsFree
lstrcpynW
InterlockedCompareExchange
LocalFree
InitializeCriticalSection
SetUnhandledExceptionFilter
OpenEventA
LoadLibraryExA
FindClose
FreeConsole
QueryPerformanceCounter
GetModuleHandleW
GlobalLock
VirtualAlloc
SetEvent
WaitForSingleObject
DisableThreadLibraryCalls
OpenMutexA
GlobalAlloc
lstrcmpiA
SystemTimeToFileTime
GetSystemTimeAsFileTime
CompareFileTime
LocalSize
MulDiv
SetThreadPriority
GlobalFree
CreateEventA
GetCurrentThread
ResetEvent
GetStartupInfoW
WideCharToMultiByte
GlobalMemoryStatus
lstrlenA
InterlockedIncrement
Sleep
lstrcpynA
FormatMessageA
DeleteCriticalSection
InterlockedExchange
TlsSetValue
GetVersionExW
CloseHandle
ResumeThread
RaiseException
LoadLibraryW
GetCurrentProcessId
MultiByteToWideChar
GetLocaleInfoW
GetProcAddress
DuplicateHandle
GetCurrentThreadId
lstrcmpA
OpenProcess
FreeLibrary
CreateThread
TlsGetValue
GetSystemInfo
GetModuleHandleA
lstrlenW
GetCurrentProcess
GetVersionExA
QueryPerformanceFrequency
GlobalUnlock
ReleaseSemaphore
ReleaseMutex
UnhandledExceptionFilter
LeaveCriticalSection
GetCommandLineW
GetThreadPriority
GetTickCount
LoadLibraryA
cmdial32
CmCustomHangUp
AutoDialFunc
ole32
CoInitializeEx
CoFileTimeNow
CoGetInterfaceAndReleaseStream
CoTaskMemAlloc
CreateBindCtx
CoMarshalInterface
CoTaskMemFree
OleInitialize
CoFreeUnusedLibraries
CreateStreamOnHGlobal
CoCreateInstance
OleSaveToStream
StringFromGUID2
ReleaseStgMedium
CoUninitialize
OleUninitialize
OleLoadFromStream
msvcrt
_vsnwprintf
malloc
_except_handler3
free
memmove
_adjust_fdiv
_initterm
advapi32
RegQueryValueExA
RegOpenKeyExA
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
activeds
FreeADsMem
crypt32
CryptFormatObject
Sections
.text Size: 512B - Virtual size: 484B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ