Static task
static1
Behavioral task
behavioral1
Sample
d5aa016eeb2b76b6376d9b00871dd703_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5aa016eeb2b76b6376d9b00871dd703_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d5aa016eeb2b76b6376d9b00871dd703_JaffaCakes118
-
Size
308KB
-
MD5
d5aa016eeb2b76b6376d9b00871dd703
-
SHA1
becf7af7da73eaea9431d604cb233310c533e5fe
-
SHA256
21ad0ec4bb2e1c42844466175cbb4243c725899e420f2c3e6453cc61ea7c2013
-
SHA512
fa8cef354cddd6cf4e5f12af5910a6fe1b8d15b60e1b0abecfd2728bde8772bce77c4e9c030dd22170922ba0910270565a99bd608ffe8e238029414166bf6224
-
SSDEEP
6144:wBma5v1+0TDv+eUv2ITGMszUR4uCHJ0ir:wB1RTDGI3dQuuu0ir
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d5aa016eeb2b76b6376d9b00871dd703_JaffaCakes118
Files
-
d5aa016eeb2b76b6376d9b00871dd703_JaffaCakes118.exe windows:4 windows x86 arch:x86
879108b1dec905ff39faf08b21228080
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFlags
SetErrorMode
LocalReAlloc
TlsGetValue
GetCPInfo
GetOEMCP
RtlUnwind
GetProcessVersion
WritePrivateProfileStringA
RaiseException
GetStartupInfoA
GetCommandLineA
ExitProcess
SetStdHandle
GetFileType
HeapReAlloc
GetTimeZoneInformation
TerminateProcess
HeapSize
GetACP
LCMapStringW
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
IsBadReadPtr
TlsFree
TlsSetValue
CompareStringA
CompareStringW
SetEnvironmentVariableA
CloseHandle
GetVersion
MultiByteToWideChar
FindResourceA
SizeofResource
LoadResource
LockResource
WideCharToMultiByte
LoadLibraryA
GetProcAddress
FreeLibrary
GetDriveTypeA
lstrlenA
lstrcpyA
lstrcatA
FindNextFileA
FindFirstFileA
FindClose
GetFileAttributesA
GetModuleFileNameA
GetCurrentThreadId
GetTempPathA
GetCurrentDirectoryA
GetLastError
GetProfileStringA
GlobalReAlloc
EnterCriticalSection
TlsAlloc
LocalAlloc
InitializeCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GlobalAddAtomA
MulDiv
GlobalGetAtomNameA
GlobalFindAtomA
GlobalDeleteAtom
GetCurrentThread
GetFileTime
FileTimeToSystemTime
GetFileSize
FileTimeToLocalFileTime
lstrcmpiA
GetVolumeInformationA
GetFullPathNameA
SetEndOfFile
FlushFileBuffers
UnlockFile
LockFile
ReadFile
SetFilePointer
WriteFile
lstrcmpA
CreateFileA
DuplicateHandle
lstrcpynA
LocalFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetLogicalDrives
ReleaseMutex
CreateMutexA
GetModuleHandleA
HeapAlloc
HeapFree
GlobalHandle
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
WaitForSingleObject
GetCurrentProcess
CreateProcessA
IsBadCodePtr
GetExitCodeProcess
LCMapStringA
user32
DestroyMenu
ClientToScreen
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
LoadStringA
DrawTextA
GrayStringA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
ScreenToClient
CopyRect
MoveWindow
ShowWindow
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
SetWindowTextA
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
SetForegroundWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
IntersectRect
SystemParametersInfoA
GetWindowPlacement
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
IsDialogMessageA
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
UnhookWindowsHookEx
CharUpperA
wsprintfA
GetDC
GetWindowRect
OffsetRect
ReleaseDC
GetWindow
InvalidateRect
EnableWindow
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
LoadIconA
SetDlgItemTextA
GetWindowTextA
GetDlgCtrlID
GetDlgItem
GetForegroundWindow
CharNextA
InflateRect
HideCaret
ExcludeUpdateRgn
ShowCaret
IsWindowUnicode
DrawFocusRect
UnregisterClassA
DefDlgProcA
gdi32
CreateDIBitmap
BitBlt
CreateCompatibleDC
GetObjectA
GetClipBox
SetTextColor
DeleteDC
SetBkColor
RestoreDC
SelectObject
SaveDC
SetBkMode
GetStockObject
SetViewportOrgEx
OffsetViewportOrgEx
SetMapMode
ScaleViewportExtEx
SetViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
DeleteObject
GetTextExtentPointA
GetDeviceCaps
CreateSolidBrush
CreateFontIndirectA
PtVisible
RectVisible
ExtTextOutA
Escape
TextOutA
CreateBitmap
PatBlt
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
comctl32
ord17
Sections
.text Size: 140KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ