Static task
static1
Behavioral task
behavioral1
Sample
ba45512498b8ad2244206dc3ae9204e7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba45512498b8ad2244206dc3ae9204e7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ba45512498b8ad2244206dc3ae9204e7_JaffaCakes118
-
Size
536KB
-
MD5
ba45512498b8ad2244206dc3ae9204e7
-
SHA1
12170fe7cbe587f633ea8f829f47bd78cab30260
-
SHA256
530d3c573a798df6bea335c2f4f04c55230c99b4ca997f02ffaef4338eb8b8d9
-
SHA512
677115b53196a60e0a091dc3357819b0d35503963d3288ee59e359b7f8993bf6e7158338a981bf967faf80ef345d3517fc1069a6e9d89d8579d2c5f9ccfc2bc1
-
SSDEEP
12288:iNHqDp5U3q0E+xF0P1brhmgNQizVniR1K3fDi73QazU2br3z3:iNHqDzU60/FSrhnVsE7i73br3b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ba45512498b8ad2244206dc3ae9204e7_JaffaCakes118
Files
-
ba45512498b8ad2244206dc3ae9204e7_JaffaCakes118.exe windows:4 windows x86 arch:x86
3aa81767a315c4e096af610069b50d11
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetClassWord
GetUpdateRect
DdeUninitialize
EnumDesktopsW
GetPropA
DlgDirSelectExA
TranslateMessage
CheckRadioButton
GetTitleBarInfo
LoadStringA
ChangeDisplaySettingsExW
GetIconInfo
ChildWindowFromPointEx
DdeSetUserHandle
LoadMenuW
SetMenuInfo
CreateWindowStationA
GetScrollBarInfo
GetTabbedTextExtentW
GetClassWord
FindWindowExA
GetKBCodePage
CreateDialogParamA
CloseWindow
SetWindowWord
IsDialogMessage
EnumPropsExA
TileWindows
CreateWindowExA
DdeQueryNextServer
DragDetect
InSendMessage
GetCaretPos
EnumDisplaySettingsExW
RegisterClassExA
SetSystemCursor
GetThreadDesktop
LoadCursorW
GetTopWindow
IsCharAlphaNumericW
OemToCharA
DrawEdge
GetClassInfoA
EndTask
RegisterClassA
GetScrollInfo
DefWindowProcW
DrawTextA
ShowWindow
LoadCursorA
SetWindowPos
GetProcessWindowStation
GetMenuItemCount
AppendMenuW
CreateDialogIndirectParamW
SendDlgItemMessageW
GetSystemMetrics
BroadcastSystemMessageA
CharUpperBuffA
DestroyWindow
DefFrameProcW
CopyIcon
wsprintfA
UnregisterClassW
OpenClipboard
GetDlgItemTextA
GetMessageTime
DlgDirSelectExW
DlgDirListComboBoxA
EnumDisplaySettingsExA
GetAsyncKeyState
MessageBoxA
IsCharLowerW
comdlg32
ReplaceTextA
LoadAlterBitmap
FindTextW
comctl32
ImageList_GetIcon
CreateUpDownControl
DrawInsert
ImageList_AddIcon
ImageList_Replace
ImageList_SetOverlayImage
CreateToolbar
DestroyPropertySheetPage
ImageList_GetImageRect
InitCommonControlsEx
ImageList_LoadImageA
ImageList_SetBkColor
MakeDragList
DrawStatusText
CreateMappedBitmap
ImageList_SetFlags
ImageList_Read
ImageList_GetDragImage
ImageList_Copy
ImageList_DrawIndirect
advapi32
RegQueryValueExA
CryptEnumProviderTypesA
RegCreateKeyExA
CryptDuplicateHash
CryptGenRandom
LookupAccountSidA
RegEnumValueA
RevertToSelf
LookupPrivilegeNameA
CryptEnumProvidersA
RegEnumValueW
CryptSetProviderW
CryptDestroyKey
RegEnumKeyExA
CreateServiceW
GetUserNameA
CryptAcquireContextA
StartServiceA
LogonUserW
CryptDuplicateKey
RegRestoreKeyW
InitiateSystemShutdownW
CryptSetProvParam
shell32
ShellAboutA
SHGetSettings
CommandLineToArgvW
kernel32
SetStdHandle
GetEnvironmentStringsW
GetTimeZoneInformation
RtlUnwind
FlushFileBuffers
HeapAlloc
GetTickCount
GetCPInfo
SetEvent
HeapDestroy
CompareStringW
CreateMutexA
TlsSetValue
InterlockedIncrement
SetLastError
FreeEnvironmentStringsA
WriteFile
EnterCriticalSection
GetACP
GetLastError
LeaveCriticalSection
InterlockedExchange
GetCurrentThread
FreeEnvironmentStringsW
GetStdHandle
LCMapStringA
WaitCommEvent
VirtualAlloc
GetOEMCP
GetCurrentThreadId
InterlockedDecrement
GetStringTypeW
GetVersion
CloseHandle
GetSystemTime
HeapReAlloc
LCMapStringW
GetFileType
HeapCreate
WideCharToMultiByte
GetModuleFileNameA
GetSystemTimeAsFileTime
WaitForMultipleObjects
VirtualQuery
GetProcAddress
TerminateProcess
HeapFree
ReadFile
VirtualFree
LoadLibraryA
TlsAlloc
GetEnvironmentStrings
MultiByteToWideChar
GetVersionExW
CompareStringA
GetModuleHandleA
GetStringTypeA
GetLocaleInfoW
TlsFree
InitializeCriticalSection
GetCommandLineA
SetFilePointer
OpenMutexA
GetStartupInfoA
DeleteCriticalSection
DeleteAtom
GetCurrentProcessId
GetCurrentProcess
GetLocalTime
SetConsoleCursorPosition
QueryPerformanceCounter
LocalShrink
TlsGetValue
UnhandledExceptionFilter
SetHandleCount
IsBadWritePtr
ExitProcess
SetEnvironmentVariableA
Sections
.text Size: 140KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 254KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ