Static task
static1
Behavioral task
behavioral1
Sample
c856ea755a3c940a96e02e8b6b9d9b31_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c856ea755a3c940a96e02e8b6b9d9b31_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c856ea755a3c940a96e02e8b6b9d9b31_JaffaCakes118
-
Size
167KB
-
MD5
c856ea755a3c940a96e02e8b6b9d9b31
-
SHA1
d5a79d90f5e9839dfe7376fe684b5b43fc898f9b
-
SHA256
e3cbc58cc461382c392452c264ccd70b0b40a9947ed1f46b746709b8bbaa3798
-
SHA512
6853d36f63ca58a7c030d5420a9755389456c05c9e72420a8d75efde06f2ac01514977c82b62523b872749062d4b542d56006938d7de2869edbd39553c073f4b
-
SSDEEP
3072:rY3Ld7Ww5JPGMB3fXS9Jfv4eci810mqkam+Zi:8swvpB3KzcWy+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c856ea755a3c940a96e02e8b6b9d9b31_JaffaCakes118
Files
-
c856ea755a3c940a96e02e8b6b9d9b31_JaffaCakes118.exe windows:4 windows x86 arch:x86
e0533cf2884b039c157b60f9af539706
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
StgOpenStorage
CoFreeUnusedLibraries
PropVariantClear
CoRevokeClassObject
shlwapi
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
SHEnumValueA
SHStrDupA
SHQueryInfoKeyA
PathGetCharTypeA
SHQueryValueExA
SHGetValueA
msvcrt
memcpy
exit
wcschr
calloc
pow
memcmp
cos
user32
CharLowerBuffA
SetWindowTextA
IsWindowVisible
MapVirtualKeyA
GetCursor
GetScrollInfo
InsertMenuItemA
GetWindowDC
SetWindowLongW
EnableScrollBar
CreateIcon
RegisterClipboardFormatA
DestroyIcon
MoveWindow
EnableWindow
RemoveMenu
DestroyMenu
DrawEdge
CreateMenu
InsertMenuA
OemToCharA
GetParent
GetActiveWindow
EnumWindows
DrawTextA
DrawIcon
GetIconInfo
GetSysColorBrush
SetActiveWindow
ScrollWindow
RemovePropA
GetKeyboardLayoutNameA
CharToOemA
GetSystemMenu
EnumChildWindows
IsWindowEnabled
UnregisterClassA
LoadBitmapA
ShowOwnedPopups
GetFocus
PostMessageA
SetClipboardData
IsIconic
ClientToScreen
GetKeyState
ChildWindowFromPoint
OpenClipboard
SetScrollPos
SetScrollInfo
SetMenu
GetWindowLongA
SendMessageA
LoadStringA
GetWindowThreadProcessId
GetMessagePos
LoadIconA
DefWindowProcA
LoadKeyboardLayoutA
GetCursorPos
CharUpperBuffA
GetMenuState
EnumThreadWindows
UnhookWindowsHookEx
EndPaint
GetPropA
CreatePopupMenu
PeekMessageA
SystemParametersInfoA
GetSysColor
IsRectEmpty
AdjustWindowRectEx
InvalidateRect
ShowWindow
RegisterClassA
ShowScrollBar
MapWindowPoints
SetWindowPlacement
TranslateMessage
GetClientRect
DispatchMessageW
FrameRect
GetKeyNameTextA
SetFocus
IsDialogMessageW
BeginPaint
GetScrollPos
SetForegroundWindow
SetWindowsHookExA
IsWindow
CheckMenuItem
FindWindowA
WaitMessage
PtInRect
TranslateMDISysAccel
GetSystemMetrics
MessageBoxA
EnableMenuItem
GetClassInfoA
CreateWindowExA
GetMenuStringA
CallWindowProcA
SetWindowPos
CharNextA
OffsetRect
DestroyWindow
CharLowerA
CallNextHookEx
GetScrollRange
RedrawWindow
CharNextW
ScreenToClient
CloseClipboard
MsgWaitForMultipleObjects
GetClipboardData
ReleaseDC
MessageBeep
GetWindowPlacement
SetWindowLongA
DrawFrameControl
wsprintfA
GetMenuItemInfoA
EqualRect
WindowFromPoint
GetDC
KillTimer
DefMDIChildProcA
GetWindowTextA
RegisterWindowMessageA
SetRect
ActivateKeyboardLayout
SetCapture
GetSubMenu
SetCursor
SendMessageW
DrawMenuBar
GetWindowLongW
GetDesktopWindow
GetWindowRect
SetScrollRange
GetCapture
GetKeyboardState
IsChild
LoadCursorA
PostQuitMessage
SetParent
TrackPopupMenu
UpdateWindow
ReleaseCapture
InflateRect
DeleteMenu
GetKeyboardLayoutList
GetMenuItemCount
DrawAnimatedRects
DefFrameProcA
IntersectRect
GetForegroundWindow
GetDlgItem
SetMenuItemInfoA
GetWindow
GetKeyboardType
SetTimer
SetPropA
GetMenu
GetMenuItemID
DrawIconEx
SetClassLongA
EmptyClipboard
DestroyCursor
GetKeyboardLayout
FillRect
IsWindowUnicode
GetClassLongA
GetClassNameA
GetDCEx
GetTopWindow
GetLastActivePopup
IsZoomed
PeekMessageW
kernel32
LoadResource
MoveFileA
GetLocaleInfoA
GetACP
CreateEventA
GetDateFormatA
FormatMessageA
GetCommandLineA
GlobalFindAtomA
InitializeCriticalSection
GetCurrentProcess
CloseHandle
GetTickCount
GetSystemDefaultLangID
CompareStringA
EnumCalendarInfoA
GetVersionExA
VirtualFree
WriteFile
GetModuleHandleA
ResetEvent
LoadLibraryExA
lstrlenA
SetLastError
lstrcpyA
GetStringTypeA
ExitThread
GetProcessHeap
CreateThread
lstrcmpA
GetCurrentThread
GetFullPathNameA
GetModuleFileNameA
FindFirstFileA
Sleep
GetCPInfo
lstrcatA
HeapDestroy
RaiseException
GetFileType
GetEnvironmentStrings
FindClose
SetErrorMode
MulDiv
HeapFree
lstrcpynA
DeleteFileA
LocalReAlloc
GetLocalTime
SetHandleCount
GetStdHandle
FreeResource
HeapAlloc
ReadFile
LockResource
GlobalAddAtomA
GetFileSize
GetStartupInfoA
FreeLibrary
ExitProcess
GetDiskFreeSpaceA
GetOEMCP
VirtualQuery
SetFilePointer
GetThreadLocale
EnterCriticalSection
GetStringTypeW
LocalFree
SetEndOfFile
GetProcAddress
lstrcmpiA
GetCurrentThreadId
SetEvent
LocalAlloc
WideCharToMultiByte
VirtualAllocEx
SizeofResource
WaitForSingleObject
GetFileAttributesA
LoadLibraryA
GlobalDeleteAtom
GetLastError
CreateFileA
GetVersion
GlobalAlloc
VirtualAlloc
GetCurrentProcessId
SetThreadLocale
GetUserDefaultLCID
MoveFileExA
Sections
CODE Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE