Static task
static1
Behavioral task
behavioral1
Sample
d4ef45379db2bcf2379a6767615bdc7f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4ef45379db2bcf2379a6767615bdc7f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4ef45379db2bcf2379a6767615bdc7f_JaffaCakes118
-
Size
668KB
-
MD5
d4ef45379db2bcf2379a6767615bdc7f
-
SHA1
2cd36565e915bbb398e404e2bd02819c567b062b
-
SHA256
46409436c3707b656efaf046cc130eb098cb3b3b9df7fd1cd88384e394fca8e9
-
SHA512
02b7b46c998f752c79a0c6ec4465fdcfd14ffff65e4fc3ac350dcad4e5a2d3646f7e4f3229a74c5f2d963e384b389e2d8f594296532805f2dd72ead009e93c44
-
SSDEEP
12288:hngFRkkc593plekeep8GLvQJfL/6o/4/JADIQeuF:VgFO//ekr7Cfr6OusIQ3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4ef45379db2bcf2379a6767615bdc7f_JaffaCakes118
Files
-
d4ef45379db2bcf2379a6767615bdc7f_JaffaCakes118.exe windows:4 windows x86 arch:x86
b37e4034e390d81e5961ece5b3c842cc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
InterlockedIncrement
GetCurrentProcessId
SetFileAttributesA
GetFileAttributesA
GetModuleHandleA
FreeLibrary
GetProcAddress
LoadLibraryA
GetLastError
FindResourceA
LockResource
SizeofResource
LoadResource
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualQuery
GetModuleFileNameA
WideCharToMultiByte
MultiByteToWideChar
MulDiv
Sleep
GlobalUnlock
GlobalLock
GlobalAlloc
LocalFree
FormatMessageA
GlobalMemoryStatus
GetVersionExA
GetFullPathNameA
SetUnhandledExceptionFilter
SetEndOfFile
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CloseHandle
TerminateThread
SuspendThread
GetCurrentThread
SetThreadPriority
CreateThread
GlobalFree
GetWindowsDirectoryA
GetCurrentDirectoryA
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
ExitProcess
TerminateProcess
GetCurrentProcess
GetSystemTimeAsFileTime
DeleteFileA
FlushFileBuffers
SetFilePointer
SetStdHandle
GetFileType
MoveFileA
SetLastError
HeapFree
HeapAlloc
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
VirtualFree
GetTimeZoneInformation
ReadFile
LCMapStringA
LCMapStringW
HeapReAlloc
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
CompareStringA
CompareStringW
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
GetACP
GetOEMCP
GetCPInfo
InterlockedExchange
CreateFileA
QueryPerformanceCounter
GetTickCount
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetEnvironmentVariableA
lstrlenA
InterlockedDecrement
user32
GetMessageA
DestroyWindow
InvalidateRect
SetRect
GetClientRect
DefWindowProcA
SetWindowLongA
PostQuitMessage
GetWindowLongA
RegisterClassA
GetClassInfoA
SendDlgItemMessageA
ScreenToClient
ReleaseDC
GetDC
SetDlgItemTextA
SendMessageA
SetCursor
EndDialog
GetSysColor
GetDlgItem
DialogBoxParamA
LoadStringA
GetMenuItemInfoA
InsertMenuItemA
GetMenuItemCount
GetSystemMetrics
DrawTextA
DrawEdge
CopyRect
InflateRect
GetSysColorBrush
TrackPopupMenuEx
TranslateAcceleratorA
FillRect
RemoveMenu
DestroyMenu
CreateMenu
CreatePopupMenu
CloseClipboard
EmptyClipboard
OpenClipboard
SetClipboardData
UnregisterClassA
CreateCursor
SetWindowPos
SetFocus
GetDlgItemTextA
EnableMenuItem
GetSystemMenu
DialogBoxIndirectParamA
MoveWindow
GetClassNameA
TranslateMessage
DispatchMessageA
RegisterWindowMessageA
SetWindowTextA
SetForegroundWindow
SetMenu
GetWindowRect
GetDesktopWindow
ClientToScreen
BeginPaint
EndPaint
LoadBitmapA
IsWindow
GetWindowThreadProcessId
CreateWindowExA
ShowWindow
UpdateWindow
AttachThreadInput
SetActiveWindow
PostMessageA
EnumWindows
IsWindowVisible
EnumChildWindows
GetParent
GetKeyState
GetWindowTextLengthW
GetWindowTextW
GetWindowTextLengthA
GetWindowTextA
LoadCursorA
RegisterClassExA
MessageBoxA
LoadAcceleratorsA
LoadIconA
FindWindowA
SetRectEmpty
OffsetRect
SystemParametersInfoA
ole32
OleRun
OleInitialize
CoCreateInstance
ReleaseStgMedium
CoUninitialize
CoInitialize
OleUninitialize
oleaut32
GetErrorInfo
SafeArrayCreateVector
VariantClear
SafeArrayDestroyDescriptor
SysFreeString
SysAllocStringByteLen
SysStringByteLen
VariantInit
SysAllocString
SafeArrayPutElement
SafeArrayCreate
ariskkey
ord11
ord19
ord33
ord25
ord41
comctl32
InitCommonControlsEx
ImageList_Draw
ImageList_GetIconSize
ImageList_Create
ImageList_ReplaceIcon
ImageList_Destroy
gdi32
CreateBitmap
PatBlt
SetBkColor
SetTextColor
SetBkMode
CreateSolidBrush
GetTextExtentPoint32A
GetStockObject
CreateFontIndirectA
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
GetObjectA
GetDeviceCaps
DeleteObject
comdlg32
GetSaveFileNameA
GetOpenFileNameA
advapi32
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegEnumKeyExA
RegEnumValueA
RegFlushKey
RegDeleteKeyA
RegQueryInfoKeyA
RegQueryValueExA
shell32
SHGetSpecialFolderLocation
DragAcceptFiles
DragFinish
DragQueryFileA
SHGetMalloc
SHGetPathFromIDListA
ShellExecuteA
Sections
.text Size: 400KB - Virtual size: 399KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 104KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 152KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ