Static task
static1
Behavioral task
behavioral1
Sample
b89b7e40cafb1adf2d2708fb86b9e033_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b89b7e40cafb1adf2d2708fb86b9e033_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b89b7e40cafb1adf2d2708fb86b9e033_JaffaCakes118
-
Size
301KB
-
MD5
b89b7e40cafb1adf2d2708fb86b9e033
-
SHA1
d37c43e739c9f65112c8b33198720c8243305888
-
SHA256
bf708a6dc55d699aa7fef9048f4058be6cf9083c9bfb79b1e187d5ad0f115f6a
-
SHA512
168490bf00b01eeae9c4b70a2b354e39232bbd9661bd7fdcaef1d11d3fe0b4feffa70936ed06c252cec74b5347b8473c755623e40555f3d53851e0fa9f19ef99
-
SSDEEP
6144:1Ouatq9nLtnGR9XACo5TdW+UKaG4JFW/gRVzgUEjRhrviICU:1O9t6ZnGLX/yZaKP4J02FkrtJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b89b7e40cafb1adf2d2708fb86b9e033_JaffaCakes118
Files
-
b89b7e40cafb1adf2d2708fb86b9e033_JaffaCakes118.exe windows:4 windows x86 arch:x86
5603514a94f741560229713b467ec227
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
lstrlenA
lstrcpyA
CreateFileA
LoadLibraryW
GetProcAddress
VirtualAlloc
CopyFileW
BuildCommDCBAndTimeoutsW
SetCurrentDirectoryW
GlobalWire
InterlockedExchange
SetComputerNameA
GetDateFormatA
WideCharToMultiByte
IsBadHugeWritePtr
IsBadStringPtrW
GetComputerNameExA
SetEnvironmentVariableW
PeekConsoleInputA
LocalShrink
CreateToolhelp32Snapshot
TerminateThread
TerminateJobObject
MoveFileExA
GlobalGetAtomNameA
FreeResource
GetSystemDefaultUILanguage
InterlockedDecrement
HeapValidate
CompareStringW
SearchPathA
DisableThreadLibraryCalls
GetCPInfoExA
GetCurrentConsoleFont
GetCommProperties
AddAtomW
QueryPerformanceFrequency
GlobalFree
ExitProcess
MapUserPhysicalPagesScatter
BeginUpdateResourceA
GetBinaryTypeA
WriteConsoleOutputW
ResetWriteWatch
GlobalLock
GetStringTypeA
CommConfigDialogA
WinExec
QueryDosDeviceA
GetFileTime
GetCommModemStatus
TlsAlloc
FindFirstFileExW
UnregisterWait
ExpandEnvironmentStringsA
TerminateProcess
GetEnvironmentStringsA
SetCommState
DisconnectNamedPipe
GetModuleHandleW
GetExitCodeThread
lstrcmpiW
HeapSize
CopyFileExA
GlobalFlags
_lopen
GetLogicalDriveStringsA
GetSystemPowerStatus
FillConsoleOutputCharacterW
SetThreadExecutionState
GetSystemInfo
GenerateConsoleCtrlEvent
GetStdHandle
WaitCommEvent
GlobalReAlloc
HeapCreate
EnumCalendarInfoExW
GetEnvironmentVariableW
CommConfigDialogW
CreatePipe
UnlockFileEx
FindFirstFileA
FreeEnvironmentStringsW
GetVolumeInformationA
GlobalUnWire
ClearCommBreak
GetTimeFormatW
GetSystemTime
SetSystemTime
WriteConsoleW
OpenMutexA
LocalFlags
_llseek
EnumSystemLanguageGroupsA
SetConsoleActiveScreenBuffer
UnhandledExceptionFilter
user32
LoadCursorA
UnhookWinEvent
NotifyWinEvent
GetForegroundWindow
SendIMEMessageExW
GetScrollInfo
DrawTextExA
GetSystemMetrics
ShowCursor
GetMenuState
SetClipboardViewer
FrameRect
InSendMessageEx
CreateWindowExA
DdeGetData
RealGetWindowClassA
SetMenuItemInfoA
DefFrameProcW
DrawMenuBar
RegisterClassA
LoadKeyboardLayoutA
GetClassWord
CharUpperBuffW
GetClassInfoExA
IntersectRect
GetKeyNameTextA
SetWindowRgn
GetParent
EndPaint
ShowOwnedPopups
DdeCmpStringHandles
SetMenuContextHelpId
RemoveMenu
PostMessageA
WinHelpA
DdeQueryNextServer
VkKeyScanW
WindowFromDC
LoadMenuIndirectW
GetQueueStatus
EditWndProc
EnableMenuItem
SetWindowTextA
GetScrollPos
SystemParametersInfoA
SetActiveWindow
IsWindowEnabled
GetClipboardData
DlgDirSelectExW
GetShellWindow
RealGetWindowClass
ReleaseDC
MonitorFromPoint
GetWindowThreadProcessId
MessageBeep
UnregisterClassW
EnumWindowStationsA
GetMessagePos
EnumThreadWindows
AdjustWindowRect
CreateDialogParamA
EnumDisplayDevicesA
TranslateMDISysAccel
TabbedTextOutA
ChangeMenuW
IMPGetIMEW
IsMenu
DdeDisconnectList
SetWindowsHookExW
SetScrollInfo
ShowScrollBar
CreateIconFromResourceEx
GetDesktopWindow
OpenDesktopW
DdeReconnect
MapVirtualKeyExW
wsprintfW
PostThreadMessageW
ScrollDC
CreateDesktopW
GetUserObjectInformationW
CharToOemA
GetWindowInfo
DdeSetQualityOfService
GetDlgItemTextA
GetSubMenu
SendMessageTimeoutA
DdeConnect
GetClassNameW
keybd_event
GetGuiResources
GetTopWindow
RegisterShellHookWindow
gdi32
GetStockObject
advapi32
RegOpenKeyExA
shell32
ExtractAssociatedIconA
DragQueryFileAorW
ExtractIconEx
SHGetFolderPathW
SHPathPrepareForWriteW
SHBrowseForFolderW
ShellHookProc
ExtractAssociatedIconW
SHGetFolderLocation
ExtractAssociatedIconExW
SHBrowseForFolderA
ShellExecuteW
SHBindToParent
SHLoadInProc
CheckEscapesW
SHAppBarMessage
SHFileOperationA
SHFormatDrive
ShellExecuteEx
SHInvokePrinterCommandW
SHGetFolderPathA
Shell_NotifyIconA
DragAcceptFiles
SHGetDesktopFolder
SHGetSpecialFolderPathW
SHInvokePrinterCommandA
SHFreeNameMappings
SHQueryRecycleBinW
SHGetDiskFreeSpaceExW
SHCreateDirectoryExA
SHFileOperationW
SHQueryRecycleBinA
SHGetFileInfoA
ExtractIconW
SHCreateProcessAsUserW
CommandLineToArgvW
DragQueryPoint
ShellAboutW
SHGetDiskFreeSpaceA
Shell_NotifyIconW
SHAddToRecentDocs
ShellExecuteExW
SHGetPathFromIDListA
DragFinish
FindExecutableW
ExtractIconA
SHGetIconOverlayIndexW
SHGetFileInfo
DoEnvironmentSubstA
SHBrowseForFolder
FindExecutableA
ExtractAssociatedIconExA
SHFileOperation
SHEmptyRecycleBinW
shlwapi
StrStrIA
StrStrA
StrRStrIW
StrCmpNW
StrRChrIA
StrChrW
StrChrA
StrStrW
StrRChrA
StrCmpNIA
StrCmpNIW
StrRStrIA
StrChrIW
Sections
.text Size: 290KB - Virtual size: 289KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text3 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text2 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ