Static task
static1
Behavioral task
behavioral1
Sample
bcda7b778f93e0e5ad4b4f5612d483d7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bcda7b778f93e0e5ad4b4f5612d483d7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bcda7b778f93e0e5ad4b4f5612d483d7_JaffaCakes118
-
Size
152KB
-
MD5
bcda7b778f93e0e5ad4b4f5612d483d7
-
SHA1
20189b3c8be103c9006e0eab130f39bec8c9a980
-
SHA256
d06d6a8f5e8005a1202c493120c8bed7484fdceb7688ea35ad8d5d97385abf62
-
SHA512
554e234baa16ad98ab222b60dfeb35a61bccecd469db442d446f253ed251a19f27ffe551d1d534582e56eeacbd909f4d7edef2652fd2515ead5a31cb474973be
-
SSDEEP
3072:MJCHQX+H/+Sk6HBsehN6lHungjocENrJdr:MJCHTbHyCNVr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bcda7b778f93e0e5ad4b4f5612d483d7_JaffaCakes118
Files
-
bcda7b778f93e0e5ad4b4f5612d483d7_JaffaCakes118.exe windows:4 windows x86 arch:x86
e312ce42f3bde8dd48c1acc11cbdf885
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetVolumeInformationA
GetFullPathNameA
GetFileSize
GetFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetCPInfo
GetOEMCP
SetErrorMode
RtlUnwind
ExitProcess
GetStartupInfoA
GetCommandLineA
HeapFree
HeapAlloc
SetStdHandle
GetFileType
RaiseException
HeapReAlloc
HeapSize
GetACP
GetTimeZoneInformation
ReadFile
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetDriveTypeA
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetCurrentProcess
DuplicateHandle
GetProcessVersion
WritePrivateProfileStringA
GlobalFlags
lstrcpynA
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
MulDiv
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetModuleHandleA
GetProcAddress
FindNextFileA
lstrcpyA
FindFirstFileA
SetLastError
FindClose
LocalFree
MultiByteToWideChar
lstrlenA
InterlockedDecrement
InterlockedIncrement
GlobalUnlock
GlobalLock
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
ReadProcessMemory
WideCharToMultiByte
GetShortPathNameA
GetPrivateProfileStringA
TerminateProcess
OpenProcess
Sleep
WinExec
CreateMutexA
GetLastError
FindResourceA
LoadResource
GlobalAlloc
LockResource
GlobalFree
CreateFileA
WriteFile
CloseHandle
SetFileAttributesA
DeleteFileA
CopyFileA
GetCurrentDirectoryA
GetModuleFileNameA
GetSystemDirectoryA
GetFileAttributesA
user32
CopyRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
IsDialogMessageA
SetWindowTextA
ShowWindow
ClientToScreen
GetDC
ReleaseDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
LoadStringA
CharUpperA
DestroyMenu
GetTopWindow
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextA
GetDlgCtrlID
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
EndDialog
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
PostQuitMessage
EnableWindow
PostMessageA
FindWindowA
GetWindowThreadProcessId
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
SetTimer
LoadIconA
GetWindowLongA
SetWindowLongA
MoveWindow
SetActiveWindow
UnregisterClassA
gdi32
SetWindowExtEx
ScaleWindowExtEx
DeleteObject
SelectObject
ScaleViewportExtEx
OffsetViewportOrgEx
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
RestoreDC
SaveDC
SetViewportExtEx
DeleteDC
SetViewportOrgEx
SetMapMode
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetStockObject
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
ShellExecuteExA
comctl32
ord17
urlmon
URLDownloadToFileA
psapi
EnumProcessModules
GetModuleFileNameExA
Sections
.text Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ