Static task
static1
Behavioral task
behavioral1
Sample
db28e581fa8b13b3df14ab34b8a02b48_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
db28e581fa8b13b3df14ab34b8a02b48_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
db28e581fa8b13b3df14ab34b8a02b48_JaffaCakes118
-
Size
404KB
-
MD5
db28e581fa8b13b3df14ab34b8a02b48
-
SHA1
9a8c2ac6be0c011cde7d9efaf49912745eddecc3
-
SHA256
150448308779c90516b3078b7898c71445f5a6318b82cd0eeaec5bae68445ca3
-
SHA512
7280a55e6691bb26b8934fc04146d895ffbf1987bcf724213076e0b8adbab7d851675fb5c25770935a60457d34897e93b9b986b517ca18050150fd1585513ec3
-
SSDEEP
6144:SVTSoOkeh5Gp2Qkz+GZ7Mbwlk56SkLFKTDX7PXXLaQGv+ziwT48YpKrYc65Q6sX:SVTbOQpa6GWrPLaQZiwT4nO6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db28e581fa8b13b3df14ab34b8a02b48_JaffaCakes118
Files
-
db28e581fa8b13b3df14ab34b8a02b48_JaffaCakes118.exe windows:4 windows x86 arch:x86
cee856cd91cc7a5daf70d62f2c078f52
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegDeleteKeyA
RegEnumKeyA
comctl32
ord14
ord15
ord17
ord13
comdlg32
GetOpenFileNameA
ChooseFontA
ChooseColorA
GetSaveFileNameA
gdi32
CreateBitmap
IntersectClipRect
ExcludeClipRect
UpdateColors
DeleteDC
GetTextExtentPoint32A
CreateCompatibleDC
DeleteObject
TextOutA
SetBkColor
SetTextColor
Rectangle
CreateSolidBrush
GetStockObject
SelectObject
CreateFontIndirectA
GetTextExtentExPointA
SetMapMode
GetDeviceCaps
RealizePalette
SelectPalette
CreatePalette
ExtTextOutA
GetCharacterPlacementW
GetPixel
SetBkMode
SetTextAlign
CreateCompatibleBitmap
TranslateCharsetInfo
GetObjectA
GetTextMetricsA
CreateFontA
LineTo
MoveToEx
CreatePen
ExtTextOutW
SetPixel
Polyline
GetCharWidthW
GetCharWidth32W
GetCharWidthA
GetCharWidth32A
SetPaletteEntries
UnrealizeObject
imm32
ImmReleaseContext
ImmGetCompositionStringW
ImmSetCompositionFontA
ImmGetContext
ImmSetCompositionWindow
shell32
ShellExecuteA
user32
TrackPopupMenu
GetCursorPos
EnableMenuItem
TranslateMessage
DestroyCaret
HideCaret
ShowCaret
CreateCaret
WaitMessage
PeekMessageA
SetScrollInfo
UpdateWindow
GetForegroundWindow
SetForegroundWindow
GetMenuItemCount
CreateMenu
GetDoubleClickTime
GetQueueStatus
GetClipboardOwner
FindWindowA
MessageBoxIndirectA
IsWindow
GetKeyboardLayout
DefWindowProcA
InvalidateRect
SetWindowPos
EndPaint
GetWindowTextA
GetWindowTextLengthA
GetClientRect
BeginPaint
SetWindowTextA
SetKeyboardState
ToAsciiEx
GetMessageTime
PostMessageA
GetSystemMenu
CheckMenuItem
IsZoomed
FlashWindow
GetClipboardData
RegisterClipboardFormatA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
SetCaretPos
SetTimer
GetKeyboardState
SetClassLongA
SetCursor
ShowCursor
CreatePopupMenu
AppendMenuA
DeleteMenu
InsertMenuA
IsIconic
GetSystemMetrics
GetCapture
ReleaseCapture
LoadIconA
GetDesktopWindow
MoveWindow
DefDlgProcA
LoadCursorA
CreateDialogParamA
GetMessageA
GetWindowLongA
IsDialogMessageA
DispatchMessageA
PostQuitMessage
EnableWindow
DialogBoxParamA
EndDialog
GetParent
SetActiveWindow
GetWindowPlacement
SetWindowPlacement
RegisterWindowMessageA
DrawEdge
SetCapture
MessageBoxA
SetFocus
GetDlgItem
GetDlgItemTextA
SetDlgItemTextA
CheckDlgButton
IsDlgButtonChecked
CheckRadioButton
WinHelpA
SetWindowLongA
MessageBeep
SendDlgItemMessageA
GetDC
ReleaseDC
SendMessageA
MapDialogRect
GetCaretBlinkTime
DestroyWindow
RegisterClassA
GetSysColor
SystemParametersInfoA
GetWindowRect
CreateWindowExA
ShowWindow
KillTimer
winmm
PlaySoundA
winspool.drv
StartDocPrinterA
WritePrinter
EndDocPrinter
ClosePrinter
EnumPrintersA
EndPagePrinter
StartPagePrinter
OpenPrinterA
kernel32
SetEnvironmentVariableA
CompareStringW
CompareStringA
HeapSize
SetEndOfFile
InterlockedExchange
RtlUnwind
SetStdHandle
SetFilePointer
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
VirtualFree
HeapCreate
HeapDestroy
LCMapStringW
LCMapStringA
GetFileType
GetStdHandle
SetHandleCount
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
GetTimeZoneInformation
FlushFileBuffers
GetStringTypeW
GetStringTypeA
GetCommandLineA
GetStartupInfoA
GetSystemTimeAsFileTime
DeleteFileA
GetLastError
TerminateProcess
ExitProcess
HeapFree
HeapReAlloc
HeapAlloc
GetDateFormatA
GetTimeFormatA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetLocalTime
WriteFile
CreateFileA
ReadFile
GetEnvironmentVariableA
GetCurrentThreadId
GetWindowsDirectoryA
FindFirstFileA
FindNextFileA
FindClose
QueryPerformanceCounter
GlobalMemoryStatus
GetCurrentThread
GetThreadTimes
GetCurrentProcess
GetProcessTimes
GetSystemTime
GetSystemTimeAdjustment
FreeLibrary
LoadLibraryA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GetModuleFileNameA
CreateProcessA
CloseHandle
Beep
WideCharToMultiByte
GetACP
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
MultiByteToWideChar
IsDBCSLeadByteEx
GetLocaleInfoA
GetOEMCP
GetCPInfo
lstrcpynA
GetModuleHandleA
GetProcAddress
GetVersionExA
MulDiv
GetTickCount
Sections
.text Size: 296KB - Virtual size: 293KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ