Static task
static1
Behavioral task
behavioral1
Sample
c0da4be1097d0cbb780842192de463f2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c0da4be1097d0cbb780842192de463f2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c0da4be1097d0cbb780842192de463f2_JaffaCakes118
-
Size
301KB
-
MD5
c0da4be1097d0cbb780842192de463f2
-
SHA1
cb9ddf9231396d6cce445e3b3096e4119919e15c
-
SHA256
bec5f5a7f171c883127aed2205006cd86823acb2df106dcee3ae11e711184821
-
SHA512
a5cc77d51c7549c27236898a89a3e03b86fa0282b10d5b9f8847b5e37f52c895e65103c4fe2ff9a669a021e7a544f31e33a19ef40b800b661b0ff7f7df94d77c
-
SSDEEP
3072:u5PNlv0BDkZ0ocv2ebIZQm3u9tm1dM/OqoZ5KT3DGtJFR2zMPHky8RZ2pFOdryd:C3v0BDxocv2e4Q4t6DT3DkJFZqqer
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c0da4be1097d0cbb780842192de463f2_JaffaCakes118
Files
-
c0da4be1097d0cbb780842192de463f2_JaffaCakes118.exe windows:4 windows x86 arch:x86
216b51e3a9ddf97656a18564ae8990a2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupOpenInfFileA
SetupGetLineByIndexA
SetupGetStringFieldA
SetupCloseInfFile
kernel32
FileTimeToSystemTime
FileTimeToLocalFileTime
RtlUnwind
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
RaiseException
HeapReAlloc
HeapSize
GetACP
GetTimeZoneInformation
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetProfileStringA
FlushFileBuffers
SetFilePointer
WriteFile
SetErrorMode
GetOEMCP
GetCPInfo
SizeofResource
GetProcessVersion
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
lstrcpynA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
MulDiv
SetLastError
FreeLibrary
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GlobalUnlock
GlobalFree
FindResourceA
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
MultiByteToWideChar
InterlockedDecrement
InterlockedIncrement
FindResourceExA
LoadResource
LockResource
WideCharToMultiByte
lstrlenA
FindFirstFileA
FindNextFileA
FindClose
CreateProcessA
WaitForSingleObject
CloseHandle
LocalFree
GetCurrentProcess
GetLastError
GetModuleHandleA
GetWindowsDirectoryA
Sleep
LoadLibraryA
GetProcAddress
GetCurrentProcessId
OpenProcess
DeleteFileA
MoveFileExA
RemoveDirectoryA
LocalAlloc
LocalLock
GetVersionExA
GetUserDefaultLCID
GetEnvironmentVariableA
user32
SendDlgItemMessageA
UpdateWindow
IsDialogMessageA
SetWindowTextA
ShowWindow
DestroyMenu
ClientToScreen
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
InvalidateRect
CopyRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
MapWindowPoints
GetWindowTextA
GetDlgCtrlID
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
LoadStringA
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
LoadIconA
SendMessageA
AppendMenuA
GetSystemMenu
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
EnableWindow
wsprintfA
ExitWindowsEx
IsIconic
GetSysColor
SetFocus
AdjustWindowRectEx
ScreenToClient
GetWindowTextLengthA
GetSystemMetrics
GetClientRect
DrawIcon
IsWindowUnicode
CharNextA
InflateRect
SetForegroundWindow
gdi32
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
DeleteObject
SetViewportExtEx
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateDIBitmap
PatBlt
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateBitmap
winspool.drv
DocumentPropertiesA
OpenPrinterA
DeletePrinter
ClosePrinter
EnumPrintersA
DeletePrinterDriverA
DeleteMonitorA
advapi32
AdjustTokenPrivileges
AllocateAndInitializeSid
RegOpenKeyA
RegGetKeySecurity
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetKeySecurity
SetSecurityDescriptorOwner
LookupPrivilegeValueA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
OpenProcessToken
RegEnumKeyExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
shell32
SHGetSpecialFolderPathA
comctl32
ord17
Sections
.text Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 48KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rrdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE