Static task
static1
Behavioral task
behavioral1
Sample
d3f467f9194712fb33bb1215ddcc978d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3f467f9194712fb33bb1215ddcc978d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d3f467f9194712fb33bb1215ddcc978d_JaffaCakes118
-
Size
176KB
-
MD5
d3f467f9194712fb33bb1215ddcc978d
-
SHA1
2438e26b659026159f587bb3f007f316de2ad21a
-
SHA256
21d6c4fe17f4bcadcfc75861dd9d4b0a41c7a8c9eeeb25d81faf6294fb6304ee
-
SHA512
caf29b8fc5dd50796a3845e4a7ec0e2342234dbf2464a6c9e25a6719d795dcfcad6ec7245299c608d9667d6162543e2597fd8f8528a2f156d96187545af9c64b
-
SSDEEP
3072:1NtlzSz5ITAz3L9puEYLs2NSTdFw/mM79XUoPA:1V0IT+PutwkSe4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3f467f9194712fb33bb1215ddcc978d_JaffaCakes118
Files
-
d3f467f9194712fb33bb1215ddcc978d_JaffaCakes118.exe windows:4 windows x86 arch:x86
b7a72d1fd4e5e55e307bece6919943eb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
GetLastError
CloseHandle
CreateFileA
DuplicateHandle
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetVolumeInformationA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetCurrentThreadId
GlobalDeleteAtom
GlobalAlloc
GlobalLock
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetVersion
FindClose
TlsAlloc
GlobalFree
GlobalUnlock
GlobalHandle
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
RaiseException
GetSystemTime
GetLocalTime
GetACP
TerminateProcess
HeapReAlloc
HeapSize
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFileTime
GetFileSize
LocalFree
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GetProcAddress
GetDriveTypeA
GetVersionExA
GetModuleHandleA
GetSystemDirectoryA
lstrlenA
lstrcpynA
GetFullPathNameA
lstrcmpiA
CopyFileA
SetFileAttributesA
GetModuleFileNameA
GetShortPathNameA
GetEnvironmentVariableA
lstrcpyA
lstrcatA
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
CreateProcessA
ResumeThread
GetFileAttributesA
DeleteFileA
lstrcmpA
GetTickCount
Sleep
SetLastError
GetTimeZoneInformation
FreeLibrary
LoadLibraryA
LocalAlloc
user32
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
DestroyMenu
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
UnhookWindowsHookEx
LoadStringA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
SetCursor
SendMessageA
PostMessageA
PostQuitMessage
GetSystemMetrics
CharUpperA
wsprintfA
GetMenuItemCount
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
GetForegroundWindow
GetAsyncKeyState
GetKeyState
ClientToScreen
GetWindow
advapi32
RegCreateKeyExA
RegCreateKeyA
RegQueryValueExA
RegSetValueExA
RegOpenKeyA
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
comctl32
ord17
wsock32
inet_addr
WSACleanup
bind
ioctlsocket
gethostbyname
connect
send
recv
closesocket
gethostname
WSAStartup
socket
htons
select
WSASetLastError
rpcrt4
UuidCreate
RpcStringFreeA
UuidToStringA
gdi32
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SetBkColor
GetObjectA
Escape
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
ExtTextOutA
TextOutA
RectVisible
DeleteObject
PtVisible
GetDeviceCaps
CreateBitmap
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comdlg32
GetFileTitleA
Sections
.text Size: 128KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE