Static task
static1
Behavioral task
behavioral1
Sample
b2b64690c608d6ed6e39115ab8ebf2c8_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b2b64690c608d6ed6e39115ab8ebf2c8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b2b64690c608d6ed6e39115ab8ebf2c8_JaffaCakes118
-
Size
1.5MB
-
MD5
b2b64690c608d6ed6e39115ab8ebf2c8
-
SHA1
e5b9ce26ef6979eccb1b63cbb025ef49ef6d571d
-
SHA256
d3e1a4bf4d87bdb6621d2a29c53a537e3a37b4cbe01e8920a5e8371c0a7ba74d
-
SHA512
2f756ff93970217b87f8c8874e9c828a38e8c8b1646a693f23d1ba66862979f58a7994c06b44b850e113363e2b685e0e0e87cb7c23db93382dc2b114ba40cef9
-
SSDEEP
24576:SdJIs5OIszRSRLd8x3Ray1PNDFEVPMQ56LpYkNPB/CrXRtxuZ2M:GJvxqRSRLd8xgy1FF26jNPB/CJuH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b2b64690c608d6ed6e39115ab8ebf2c8_JaffaCakes118
Files
-
b2b64690c608d6ed6e39115ab8ebf2c8_JaffaCakes118.exe windows:4 windows x86 arch:x86
a5dc50b37b62669d0c8e75beedd5a5e3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileStructA
WritePrivateProfileStructA
GetCurrentProcess
lstrcpyA
SetPriorityClass
GetShortPathNameA
GlobalUnlock
CreateEventA
lstrcmpA
GlobalReAlloc
SetThreadPriority
MultiByteToWideChar
GetDriveTypeA
GetLogicalDrives
GetSystemTime
GetStartupInfoA
GetPrivateProfileStringA
Sleep
CreateThread
WaitForSingleObject
CloseHandle
GetModuleFileNameA
FindResourceA
LoadResource
LockResource
MulDiv
GetTickCount
GlobalAlloc
GetFileAttributesA
ExitProcess
CopyFileA
CreateSemaphoreA
GetLastError
ReleaseSemaphore
GetFullPathNameA
FindNextFileA
TerminateThread
MoveFileA
CreateFileA
ReadFile
SetFilePointer
WriteFile
SetEndOfFile
FreeLibrary
lstrcpynA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateDirectoryA
FindFirstFileA
FindClose
WideCharToMultiByte
CreateProcessA
lstrcmpiA
DeleteFileA
GetTempFileNameA
GetPrivateProfileIntA
SetCurrentDirectoryA
GetCurrentDirectoryA
RemoveDirectoryA
SystemTimeToFileTime
GlobalLock
GlobalFree
GetModuleHandleA
user32
LoadCursorA
SetCursor
ClientToScreen
GetUpdateRect
BeginPaint
GetCursorPos
EndPaint
GetForegroundWindow
CopyRect
IsWindow
FindWindowA
PostMessageA
SetWindowLongA
SetParent
FindWindowExA
DefWindowProcA
IsChild
CheckMenuItem
SetWindowTextA
GetWindowDC
ReleaseDC
DestroyWindow
CreateDialogParamA
GetDlgItem
GetWindowRect
ScreenToClient
SetWindowPos
InvalidateRect
SendMessageA
GetDlgItemTextA
DrawTextA
SetForegroundWindow
ShowWindow
GetParent
TrackPopupMenu
ReleaseCapture
SetCapture
CreateWindowExA
IsWindowVisible
GetClientRect
EnableWindow
LoadImageA
wsprintfA
GetSubMenu
EndDialog
MessageBoxA
GetAsyncKeyState
DispatchMessageA
GetMessageA
GetSystemMetrics
KillTimer
SetFocus
UnregisterClassA
FillRect
EnumDisplaySettingsA
SetRect
SystemParametersInfoA
CharPrevA
DestroyIcon
DestroyCursor
BeginDeferWindowPos
DeferWindowPos
EndDeferWindowPos
SetWindowRgn
wvsprintfA
CheckRadioButton
SetDlgItemInt
GetDlgItemInt
DrawIconEx
SetTimer
WindowFromPoint
RegisterClipboardFormatA
SetClassLongA
DialogBoxParamA
LoadBitmapA
IsDlgButtonChecked
CreatePopupMenu
DestroyMenu
PostQuitMessage
UpdateWindow
LoadMenuA
GetSystemMenu
InsertMenuA
GetMenuItemInfoA
InsertMenuItemA
LoadIconA
RegisterClassA
GetClassInfoA
RegisterWindowMessageA
LoadStringA
LoadAcceleratorsA
IsDialogMessageA
TranslateAcceleratorA
TranslateMessage
CharNextA
CallWindowProcA
SendDlgItemMessageA
PeekMessageA
SetDlgItemTextA
GetDC
GetWindowTextA
RegisterClassExA
CheckDlgButton
gdi32
DeleteDC
GetDIBits
SelectObject
CreateCompatibleDC
SetBkMode
SetTextColor
LineTo
MoveToEx
UpdateColors
RealizePalette
SelectPalette
CreatePalette
GetDeviceCaps
CreateBrushIndirect
GetNearestColor
GetPixel
GetTextMetricsA
CreateFontA
CreateCompatibleBitmap
StretchBlt
ExtSelectClipRgn
Rectangle
IntersectClipRect
SetBkColor
GetStockObject
CreatePen
TextOutA
CreateRectRgn
CreatePolyPolygonRgn
GetTextExtentPoint32A
CreateSolidBrush
GetObjectA
RoundRect
GetBkColor
GetTextColor
DeleteObject
advapi32
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegDeleteValueA
RegSetValueExA
RegDeleteKeyA
RegEnumKeyA
RegEnumKeyExA
RegOpenKeyExA
shell32
ShellExecuteA
SHGetMalloc
DragQueryPoint
DragQueryFileA
DragFinish
SHBrowseForFolderA
SHGetPathFromIDListA
Shell_NotifyIconA
comctl32
ord17
ole32
CoCreateGuid
CoRevokeClassObject
RevokeDragDrop
OleInitialize
RegisterDragDrop
CoRegisterClassObject
CoInitialize
CLSIDFromString
CoCreateInstance
comdlg32
GetSaveFileNameA
GetOpenFileNameA
msvcrt
_XcptFilter
_onexit
__dllonexit
__CxxFrameHandler
_purecall
malloc
free
strtol
fwrite
qsort
__mb_cur_max
_isctype
_pctype
mbstowcs
wcstombs
??2@YAPAXI@Z
srand
sprintf
_except_handler3
toupper
fseek
ftell
realloc
fputc
memset
_exit
exit
memcmp
fgets
atoi
strncpy
strlen
strcmp
strncmp
fprintf
sqrt
sin
pow
strcat
fopen
fread
fclose
strcpy
_mbsstr
memcpy
_CIpow
rand
_ftol
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_stricmp
_controlfp
_strnicmp
_strdup
Sections
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CODE Size: 1KB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE