Static task
static1
Behavioral task
behavioral1
Sample
cf8453906e162965c0ba9e329ddc29ef_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cf8453906e162965c0ba9e329ddc29ef_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cf8453906e162965c0ba9e329ddc29ef_JaffaCakes118
-
Size
532KB
-
MD5
cf8453906e162965c0ba9e329ddc29ef
-
SHA1
fc60587f5f9930cd5973e7abcf00c1d3ed1c9596
-
SHA256
853d8ad0740a07c7b85b555a0a5a4503da5b80c6ba94dd9fb7388b7c0fdb0a03
-
SHA512
0192c1afc2ebb6e801fae60b919ea8bf26300713d0afdb7b09cd67999287b7090ac7a2d3c3eeaa610867dfe16d99dad62ac341cebd5f7c63fc4b2846d99e1095
-
SSDEEP
12288:n4a56gjW1rf1yg5asQxyi3Vui8TmNkn8itHZfC8hZuYwjLFd4BiC:nNTW1QCasQrVui8TckNHZ5V6L8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf8453906e162965c0ba9e329ddc29ef_JaffaCakes118
Files
-
cf8453906e162965c0ba9e329ddc29ef_JaffaCakes118.exe windows:4 windows x86 arch:x86
95c72824892c185e55329be0c50f6d09
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
QueryPerformanceCounter
FlushFileBuffers
HeapCreate
GetProcAddress
VirtualFree
SetFilePointer
GetCommandLineW
WriteProfileStringW
SetConsoleOutputCP
EnterCriticalSection
GetStartupInfoA
GetCommandLineA
SetComputerNameW
FreeEnvironmentStringsA
EnumSystemLocalesA
TlsGetValue
GetLocalTime
LCMapStringA
CompareStringW
ConnectNamedPipe
SetStdHandle
SetConsoleWindowInfo
RtlMoveMemory
WideCharToMultiByte
GetTimeZoneInformation
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
CreateDirectoryExA
SetSystemTime
CreateMutexA
SetWaitableTimer
CreateWaitableTimerW
SetEnvironmentVariableA
FreeLibraryAndExitThread
MultiByteToWideChar
InitializeCriticalSection
LocalCompact
SetFileAttributesW
HeapFree
GetSystemTimeAsFileTime
TlsAlloc
HeapReAlloc
GetEnvironmentStrings
GetModuleFileNameA
CreateFileW
LCMapStringW
GetPrivateProfileStructA
GetModuleFileNameW
GetProcessHeaps
UnhandledExceptionFilter
GetSystemTime
TlsSetValue
ReadFile
HeapLock
HeapDestroy
MoveFileExA
LeaveCriticalSection
InterlockedExchange
GetStartupInfoW
IsBadWritePtr
ExitProcess
IsDebuggerPresent
SystemTimeToTzSpecificLocalTime
GetCurrentThread
GetThreadContext
SetLocaleInfoW
HeapAlloc
DebugBreak
GetModuleHandleA
GetCurrentThreadId
GetVolumeInformationW
InterlockedIncrement
EnumTimeFormatsW
CreateFileA
RtlUnwind
SetConsoleCtrlHandler
WriteConsoleA
CreateProcessW
GetSystemDefaultLCID
VirtualQuery
GetTickCount
GetPrivateProfileSectionW
GetStringTypeW
CreateRemoteThread
SetEvent
EnumCalendarInfoW
EnumCalendarInfoA
TlsFree
GetStringTypeA
GetVersion
CompareStringA
GetShortPathNameA
GetEnvironmentStringsW
InterlockedDecrement
TransactNamedPipe
WriteConsoleOutputW
SetConsoleTextAttribute
WriteFile
DeleteFileW
ExpandEnvironmentStringsA
lstrcmpiA
GetCPInfo
FindResourceW
SetLastError
SetHandleCount
GetPrivateProfileStringW
DeleteCriticalSection
CloseHandle
GetFileType
GetProfileStringA
FindNextFileW
OpenMutexA
GetCurrencyFormatW
FreeEnvironmentStringsW
GetStdHandle
GetLastError
SetConsoleMode
GetThreadTimes
LoadLibraryA
GetSystemTimeAdjustment
VirtualAlloc
FindResourceExW
ConvertDefaultLocale
LocalUnlock
comctl32
ImageList_AddMasked
ImageList_Duplicate
CreateMappedBitmap
ImageList_Destroy
GetEffectiveClientRect
InitCommonControlsEx
comdlg32
LoadAlterBitmap
user32
SendInput
DefWindowProcW
SetUserObjectSecurity
GetIconInfo
CharNextExA
RegisterClassExA
RegisterWindowMessageW
TranslateAccelerator
GetMessageTime
ShowWindow
GetUpdateRgn
SetWindowPlacement
TranslateMessage
CreateWindowExA
ActivateKeyboardLayout
DdeInitializeA
GetScrollPos
AdjustWindowRect
RemoveMenu
EnumDisplaySettingsExW
MessageBoxA
SetScrollInfo
DlgDirListA
DispatchMessageW
ChildWindowFromPointEx
SetRect
DdePostAdvise
CopyImage
VkKeyScanExW
FreeDDElParam
SetWindowsHookW
PackDDElParam
GetPropA
PtInRect
CharNextW
ChangeDisplaySettingsExW
UnpackDDElParam
InSendMessage
EnumDisplayDevicesA
SetLastErrorEx
RegisterDeviceNotificationW
GetDialogBaseUnits
ShowOwnedPopups
GetDC
PeekMessageA
GetThreadDesktop
SetWindowsHookExW
GetDoubleClickTime
TrackPopupMenuEx
RegisterClassA
CheckMenuItem
DestroyWindow
GetWindowDC
GrayStringW
advapi32
RegSetValueExA
gdi32
ColorMatchToTarget
Chord
CopyMetaFileA
Pie
GetDeviceCaps
CreateDIBPatternBrushPt
CreateColorSpaceW
SetMetaRgn
DeleteDC
SetEnhMetaFileBits
CreateDCW
PtInRegion
CreateFontW
GetCharABCWidthsFloatA
SetStretchBltMode
GetObjectA
Sections
.text Size: 156KB - Virtual size: 153KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 248KB - Virtual size: 245KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ