Static task
static1
Behavioral task
behavioral1
Sample
bd8caace99a9ac8ea2778dd2ce8f2093_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bd8caace99a9ac8ea2778dd2ce8f2093_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bd8caace99a9ac8ea2778dd2ce8f2093_JaffaCakes118
-
Size
243KB
-
MD5
bd8caace99a9ac8ea2778dd2ce8f2093
-
SHA1
70b9bf568a2739371c39144705f0f2845193638e
-
SHA256
1544fb90394dd3b159484857b9b13da1c8d5610cb56a15b4a66552d801894d5f
-
SHA512
35cd4ffdbbc42e04bab6d274be26472f56df15ff3612354a0e212f28dc16c2369b020b5134bce109204b5de9124d8e8275f9e01efb4dbcf072555664a771d4c2
-
SSDEEP
6144:Ni+2141wPez1y0SNCurzEcUfSaxwcbTrk:MQl1BcCurCqaxjzk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd8caace99a9ac8ea2778dd2ce8f2093_JaffaCakes118
Files
-
bd8caace99a9ac8ea2778dd2ce8f2093_JaffaCakes118.exe windows:4 windows x86 arch:x86
617747fb84c46f14e8d54dfd7b4662f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
atol
RtlDeleteCriticalSection
atoi
wcscat
NtWaitForSingleObject
kernel32
WaitForSingleObject
FindClose
GetFileSize
LocalReAlloc
MoveFileA
WideCharToMultiByte
ExitThread
VirtualAlloc
GetProcessHeap
LoadLibraryA
GetOEMCP
GlobalAlloc
GetEnvironmentStrings
GetProcAddress
GlobalAddAtomA
CreateThread
SetFilePointer
SetHandleCount
GetVersionExA
SizeofResource
MoveFileExA
GetCurrentProcess
DeleteFileA
ExitProcess
GetCurrentThread
GetACP
GetLastError
CreateEventA
DeleteCriticalSection
SetErrorMode
lstrcpynA
SetEndOfFile
GlobalDeleteAtom
LockResource
LocalAlloc
GetCurrentThreadId
SetThreadLocale
GetFileAttributesA
Sleep
SetLastError
lstrcatA
GetStringTypeA
GetCommandLineA
HeapAlloc
VirtualQuery
FormatMessageA
LoadLibraryExA
GlobalFindAtomA
lstrlenA
ResetEvent
WriteFile
EnumCalendarInfoA
lstrcpyA
CreateFileA
GetStringTypeW
LoadResource
FreeResource
MulDiv
HeapFree
GetCPInfo
GetLocaleInfoA
GetVersion
lstrcmpiA
GetCurrentProcessId
GetStdHandle
FindResourceA
GetSystemDefaultLangID
GetThreadLocale
LocalFree
GetStartupInfoA
GetModuleHandleA
CompareStringA
GetDiskFreeSpaceA
GetLocalTime
ReadFile
RaiseException
SetEvent
GetTickCount
lstrcmpA
VirtualFree
ole32
CoGetContextToken
CLSIDFromProgID
OleRun
StringFromIID
OleRegGetUserType
user32
GetDesktopWindow
CreateIcon
GetDlgItem
GetClassLongA
BeginDeferWindowPos
DefFrameProcA
IsDialogMessageA
EnumThreadWindows
FindWindowA
EndDeferWindowPos
GetDCEx
MessageBoxA
CreateWindowExA
DeferWindowPos
DrawMenuBar
GetMenuItemCount
CharLowerBuffA
CreateMenu
GetCapture
DrawFrameControl
GetKeyNameTextA
DispatchMessageW
GetMenuItemID
GetClientRect
GetWindow
GetScrollPos
ClientToScreen
IsWindowVisible
IsMenu
DrawIconEx
SetTimer
IsChild
GetSysColorBrush
CharToOemA
EnumWindows
SetWindowPos
GetScrollRange
GetSubMenu
CreateIcon
DrawFrameControl
GetDCEx
GetDesktopWindow
GetClassLongA
GetMenuItemID
EndPaint
GetIconInfo
CreateWindowExA
IsWindowEnabled
RegisterClassA
SetCursor
GetClassInfoA
GetClientRect
MessageBoxA
EndDeferWindowPos
GetDlgItem
BeginDeferWindowPos
IsWindowVisible
GetPropA
GetLastActivePopup
ShowWindow
EnableMenuItem
FillRect
GetCursor
GetMenuItemInfoA
EqualRect
GetScrollPos
DrawEdge
IsMenu
EnumThreadWindows
IsDialogMessageA
GetParent
DrawMenuBar
DefWindowProcA
SetWindowLongA
FindWindowA
GetActiveWindow
CheckMenuItem
DefFrameProcA
GetWindow
GetMenuItemCount
EnumChildWindows
HideCaret
ClientToScreen
GetWindowTextA
GetCursorPos
DeferWindowPos
GetFocus
GetScrollInfo
GetSysColorBrush
IsChild
GetMenuState
DrawIcon
FrameRect
DispatchMessageA
GetKeyState
SystemParametersInfoA
GetCapture
GetMessagePos
GetForegroundWindow
CallWindowProcA
CharToOemA
EnableScrollBar
CallNextHookEx
DispatchMessageW
DrawIconEx
BeginPaint
GetMenuStringA
GetDC
GetClipboardData
SetTimer
CharLowerA
CreatePopupMenu
CreateMenu
comctl32
ImageList_Remove
ImageList_Create
ImageList_Destroy
ImageList_Write
ImageList_Read
ImageList_GetBkColor
ImageList_DrawEx
ImageList_Draw
shell32
Shell_NotifyIconA
msvcrt
rand
atol
mbstowcs
wcscspn
sqrt
malloc
clock
swprintf
_acmdln
memmove
srand
sprintf
tolower
exit
strlen
sqrt
srand
calloc
mbstowcs
memcpy
memset
memmove
malloc
_acmdln
swprintf
rand
comdlg32
GetFileTitleA
FindTextA
GetOpenFileNameA
GetSaveFileNameA
advapi32
RegOpenKeyExA
RegDeleteKeyA
RegQueryValueA
RegLoadKeyA
RegEnumValueA
RegEnumKeyA
shlwapi
PathGetCharTypeA
PathIsDirectoryA
SHDeleteKeyA
PathFileExistsA
SHEnumValueA
SHGetValueA
SHDeleteValueA
SHQueryInfoKeyA
version
VerQueryValueA
GetFileVersionInfoSizeA
gdi32
CreateCompatibleDC
CreateDIBitmap
SetBkColor
CopyEnhMetaFileA
CreatePalette
GetPixel
BitBlt
SetTextColor
SaveDC
oleaut32
SafeArrayGetUBound
Sections
CODE Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 202KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE