Static task
static1
Behavioral task
behavioral1
Sample
b7d6ff1edc576c1b74e8cea309d59182_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b7d6ff1edc576c1b74e8cea309d59182_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7d6ff1edc576c1b74e8cea309d59182_JaffaCakes118
-
Size
536KB
-
MD5
b7d6ff1edc576c1b74e8cea309d59182
-
SHA1
f3f400fb80aea2920a620628660e54be86f6428f
-
SHA256
be540e9fecd6ebadd6ebc4c17a9ed7242ab5c3be4badabcb5c7e6cda12c7077d
-
SHA512
37aaee4fc05b6859091bee18be0cbabd0fabb631b05e89e5dbbf0bab56051bafd233462bce029543bc00597900419c649ab0df6bfef5c4c4459bae9e2649b092
-
SSDEEP
12288:AVZySaQBiMZpqD2RI9QDpzrMjpzX/6R1nDgU+N/+:AVZ1jiIuYPDp3MjRw++
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7d6ff1edc576c1b74e8cea309d59182_JaffaCakes118
Files
-
b7d6ff1edc576c1b74e8cea309d59182_JaffaCakes118.exe windows:4 windows x86 arch:x86
69253d5cc52432dc05288e29d90d4894
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VariantClear
SysFreeString
SysAllocString
SysStringLen
user32
DispatchMessageA
GetDC
GetCursorPos
CreateWindowExA
MoveWindow
ClientToScreen
DestroyWindow
GetMessageA
GetParent
UpdateWindow
ShowWindow
EnableWindow
PeekMessageA
TranslateMessage
IsWindowEnabled
GetWindow
EnableMenuItem
RegisterClassA
GetWindowLongA
SetTimer
FillRect
EndPaint
BeginPaint
DefWindowProcA
IsWindow
GetWindowRect
PostMessageA
SetWindowLongA
EndDialog
SetWindowTextA
CheckMenuItem
wsprintfA
GetDlgItem
ScreenToClient
LoadCursorA
LoadIconA
GetDesktopWindow
SetCapture
SetForegroundWindow
ReleaseDC
MessageBoxA
GetSysColor
IsWindowVisible
GetSubMenu
InvalidateRect
SendMessageA
GetClientRect
CallWindowProcA
SetCursor
SetWindowPos
LoadBitmapA
PostQuitMessage
GetSystemMetrics
kernel32
LoadResource
InitializeCriticalSection
FormatMessageW
LocalFree
FreeLibrary
SetFileAttributesA
FindClose
GetStringTypeW
HeapReAlloc
GetExitCodeProcess
GetSystemTimeAsFileTime
GetTimeZoneInformation
WriteFile
InterlockedExchange
GetStringTypeA
lstrcmpiA
TlsGetValue
DeleteFileW
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
FindNextFileA
HeapDestroy
GetFileAttributesW
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetStartupInfoW
GetLocaleInfoA
LocalAlloc
lstrcatA
CreateFileA
SetErrorMode
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetTempPathA
VirtualAlloc
FindResourceA
Sleep
VirtualFree
HeapCreate
IsValidCodePage
CreateProcessA
SizeofResource
GetVersion
GetModuleHandleW
GetACP
lstrcpynA
CloseHandle
ReadFile
SetFilePointer
TlsFree
MapViewOfFile
RaiseException
GetCurrentThread
InterlockedCompareExchange
GetCommandLineA
HeapSize
GetCPInfo
GetCommandLineW
LockResource
GetCurrentProcessId
GetEnvironmentStrings
FileTimeToLocalFileTime
CreateProcessW
lstrlenW
VirtualQuery
GlobalUnlock
GetEnvironmentStringsW
GetThreadLocale
FindNextFileW
LCMapStringA
GetConsoleCP
GlobalFree
lstrlenA
GetSystemInfo
UnmapViewOfFile
LoadLibraryExW
GetLastError
LeaveCriticalSection
ExitProcess
TlsSetValue
GetFileType
WriteConsoleA
CreateFileW
CreateEventW
RemoveDirectoryA
ExpandEnvironmentStringsA
WaitForMultipleObjects
DuplicateHandle
FindFirstFileW
CreateFileMappingA
ResetEvent
CompareStringA
InterlockedIncrement
lstrcpyA
FindFirstFileA
lstrcmpA
CompareStringW
GetProcessHeap
GlobalLock
FormatMessageA
SetEvent
GetWindowsDirectoryA
DeleteFileA
LCMapStringW
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
TlsAlloc
IsBadWritePtr
GetTickCount
QueryPerformanceCounter
GetOEMCP
LoadLibraryW
SetHandleCount
EnterCriticalSection
HeapFree
WriteConsoleW
SetCurrentDirectoryA
GetProcAddress
GetCurrentThreadId
SetEndOfFile
GetConsoleMode
GlobalAlloc
InterlockedDecrement
TerminateProcess
SetEnvironmentVariableA
GetSystemDirectoryA
MulDiv
SetUnhandledExceptionFilter
CreateThread
GetModuleHandleA
CreateMutexA
GetLocalTime
MultiByteToWideChar
UnhandledExceptionFilter
GetPrivateProfileStringA
CreateEventA
LoadLibraryExA
GetModuleFileNameA
FlushFileBuffers
HeapAlloc
IsDebuggerPresent
GetModuleFileNameW
GetEnvironmentVariableA
SetLastError
WideCharToMultiByte
advapi32
RegSetValueExA
RegDeleteValueA
RegSetValueExW
OpenProcessToken
RegQueryValueExW
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExW
RegCloseKey
RegDeleteKeyA
gdi32
DeleteDC
GetDeviceCaps
DeleteObject
SetBkColor
CreateSolidBrush
msvcrt
_controlfp
_cexit
exit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_strcmpi
Sections
.text Size: 344KB - Virtual size: 343KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ