Static task
static1
Behavioral task
behavioral1
Sample
b54125d81a0b2739cf3f715996918750_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b54125d81a0b2739cf3f715996918750_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b54125d81a0b2739cf3f715996918750_JaffaCakes118
-
Size
361KB
-
MD5
b54125d81a0b2739cf3f715996918750
-
SHA1
86bc0567242492004ca05f92fbf71f92f3e39b7b
-
SHA256
056deb372f880fdd2b187d08360638819e21524683b512dad2aec9071ebe9bef
-
SHA512
dbc76a292991f493d05de9cdd96d4ff75c164c6d0892ec2ed792436a9da8452c82a4bd350909d888f4309ee97883a476c338d335ba5b48f9b8e60a94d6be1377
-
SSDEEP
6144:n5rznxFRBxCwFuP6rjo77A0v9924sL0EO4uX7MxXZTBlebfz1mKfZ0EP0:tn7Jjo77A019kjVZT3eDz8NEP0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b54125d81a0b2739cf3f715996918750_JaffaCakes118
Files
-
b54125d81a0b2739cf3f715996918750_JaffaCakes118.exe windows:4 windows x86 arch:x86
6a319a8b370b355b66a4a2f080a27bb9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FileTimeToSystemTime
GetTickCount
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
GetSystemTimeAsFileTime
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoA
RtlUnwind
ExitProcess
RaiseException
HeapSize
Sleep
GetConsoleCP
GetConsoleMode
HeapDestroy
SetErrorMode
VirtualFree
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetACP
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
SetEnvironmentVariableA
GetOEMCP
GetCPInfo
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
FormatMessageA
LocalFree
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
MulDiv
InterlockedDecrement
GetModuleFileNameW
GlobalUnlock
GetCurrentProcessId
GlobalAddAtomA
WritePrivateProfileStringA
FreeResource
GlobalFree
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
GetModuleFileNameA
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryA
FindResourceA
LoadResource
LockResource
SizeofResource
GlobalLock
lstrcmpA
GlobalAlloc
FreeLibrary
GlobalDeleteAtom
GetModuleHandleA
GetProcAddress
GetProcessHeap
HeapFree
HeapAlloc
GetVersion
CompareStringA
InterlockedExchange
MultiByteToWideChar
CompareStringW
WideCharToMultiByte
lstrlenA
GetCommandLineA
CloseHandle
UnmapViewOfFile
SetLastError
GetFileSizeEx
MapViewOfFile
CreateFileMappingA
GetLastError
HeapCreate
CreateFileA
user32
RegisterClipboardFormatA
PostThreadMessageA
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
ReleaseCapture
LoadCursorA
SetCapture
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextA
GetForegroundWindow
GetTopWindow
GetMessageTime
DestroyMenu
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnhookWindowsHookEx
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
SetWindowsHookExA
UnregisterClassA
CallNextHookEx
GetMessageA
GetSysColorBrush
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
GetMessagePos
InvalidateRect
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetWindow
SetWindowContextHelpId
GetParent
MapDialogRect
SetWindowPos
PostQuitMessage
PostMessageA
CharUpperA
EnableWindow
GetClientRect
GetSystemMetrics
SendMessageA
IsIconic
LoadIconA
GetClassInfoExA
gdi32
GetStockObject
SelectObject
GetDeviceCaps
GetBkColor
GetTextColor
DeleteDC
GetRgnBox
GetMapMode
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
CreateRectRgnIndirect
CreateBitmap
GetWindowExtEx
GetViewportExtEx
GetObjectA
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
SetViewportOrgEx
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegDeleteKeyA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
VariantCopy
SysAllocString
SafeArrayDestroy
SystemTimeToVariantTime
VariantTimeToSystemTime
OleCreateFontIndirect
SysAllocStringByteLen
SysStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
SysFreeString
imagehlp
CheckSumMappedFile
iphlpapi
GetAdaptersInfo
GetPerAdapterInfo
Sections
.text Size: 240KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ