Static task
static1
Behavioral task
behavioral1
Sample
dd8a762e0042e34136eb1412dad0bc77_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd8a762e0042e34136eb1412dad0bc77_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dd8a762e0042e34136eb1412dad0bc77_JaffaCakes118
-
Size
296KB
-
MD5
dd8a762e0042e34136eb1412dad0bc77
-
SHA1
43e638244d0e195c88738e154412745baee5dd85
-
SHA256
831e1f9682a8c966087440470c7b10a0450f1865388ea5b3fe41910d5cd68fbe
-
SHA512
8fca41ac2aeef41fa077c79b511836b8dc745b3131697aff14c85fdd5ec85e37b3bbbc3e412f68aa3780202993a97f51e3e0818e0dcd53a2d4d6a0c7c0009de4
-
SSDEEP
6144:hEzOvTkrYI6nXo8RIuXhLNfyNiwmi0LrEHiZ27x+wJ2W8:sqGY9Xo8R7hLbi0LoCZy+gZ8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dd8a762e0042e34136eb1412dad0bc77_JaffaCakes118
Files
-
dd8a762e0042e34136eb1412dad0bc77_JaffaCakes118.exe windows:4 windows x86 arch:x86
3a4cf409f8b7f6b2cf61d5b95f8839ff
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleTitleA
WriteConsoleA
GetComputerNameA
EnumTimeFormatsA
UnlockFileEx
SetUserGeoID
GetSystemDirectoryA
SetFilePointer
GetOEMCP
RegisterWaitForInputIdle
LZCloseFile
DefineDosDeviceA
GetTapeParameters
GetThreadTimes
SetInformationJobObject
SetEnvironmentVariableA
lstrcmpA
OutputDebugStringA
GetLocaleInfoA
IsBadCodePtr
TermsrvAppInstallMode
GetSystemTimes
MoveFileWithProgressA
CloseHandle
SetConsoleOutputCP
LocalLock
lstrcpyA
CreateSocketHandle
PeekConsoleInputA
GlobalCompact
HeapSize
IsValidCodePage
OpenProcess
GetTempPathA
MoveFileExA
OpenWaitableTimerA
ProcessIdToSessionId
SetConsoleWindowInfo
PurgeComm
GetCurrentDirectoryA
MoveFileExW
GetModuleHandleA
WriteProfileStringA
GetWindowsDirectoryA
CancelTimerQueueTimer
EndUpdateResourceA
ReadConsoleA
GetThreadContext
FindAtomA
ConnectNamedPipe
ExpandEnvironmentStringsA
IsSystemResumeAutomatic
ReadConsoleOutputCharacterA
GlobalDeleteAtom
CreateWaitableTimerA
HeapSize
VirtualAllocEx
SetMailslotInfo
HeapReAlloc
VirtualAllocEx
QueryDosDeviceA
WritePrivateProfileStringA
GetPrivateProfileStructA
GetDiskFreeSpaceA
TerminateJobObject
GetCurrentProcessId
GetLogicalDriveStringsA
GetCommTimeouts
GetFileAttributesExA
CreateTimerQueueTimer
WriteConsoleInputA
GlobalHandle
GlobalUnfix
GetAtomNameA
GetProfileSectionA
GetLocalTime
VerifyVersionInfoA
GetEnvironmentVariableA
IsBadReadPtr
FindFirstFileExA
SetProcessPriorityBoost
PulseEvent
WaitForDebugEvent
FillConsoleOutputCharacterA
GetProcessTimes
GetProcessHeaps
ExpungeConsoleCommandHistoryA
GetConsoleWindow
OpenSemaphoreA
GetDevicePowerState
OpenMutexA
winmm
timeGetSystemTime
user32
EnterReaderModeHelper
CreateIcon
GetClassInfoA
DrawMenuBarTemp
ToAsciiEx
GetWindowRgn
GetGUIThreadInfo
LoadIconA
ShowWindowAsync
GetWindowTextA
LoadKeyboardLayoutEx
MonitorFromPoint
EnableMenuItem
SetWindowWord
GetMenuCheckMarkDimensions
InsertMenuItemA
SetInternalWindowPos
RegisterTasklist
GetMenuStringA
GetDlgItemTextA
SetMenuItemInfoA
GetCapture
SetDlgItemInt
GetMonitorInfoA
SetCaretBlinkTime
GetWindowInfo
SetActiveWindow
MenuWindowProcA
DrawMenuBar
IsWinEventHookInstalled
NotifyWinEvent
IsServerSideWindow
GetForegroundWindow
GetRawInputBuffer
LoadIconA
UnloadKeyboardLayout
ToUnicode
MessageBoxTimeoutA
ReleaseCapture
GetMenuItemID
MenuItemFromPoint
InsertMenuA
BroadcastSystemMessageExA
SendMessageTimeoutA
ShowWindow
LoadImageA
CreateAcceleratorTableA
GetRawInputDeviceInfoA
CreateIconFromResourceEx
GetMenuItemInfoA
BringWindowToTop
EnumWindowStationsA
GetWindowThreadProcessId
CharUpperBuffA
CreateWindowStationW
GetWindowDC
IsCharUpperA
SetWindowsHookA
GetKeyNameTextA
SetWindowTextA
EnumDesktopWindows
CharLowerA
IsGUIThread
GetWindowInfo
InflateRect
UnpackDDElParam
OpenDesktopA
GetDialogBaseUnits
RegisterDeviceNotificationA
TileChildWindows
IsWindowVisible
GetCursor
RegisterDeviceNotificationA
RemovePropA
CreateDialogIndirectParamA
SetWindowPlacement
GetClassLongA
SetWindowTextA
OpenWindowStationA
SendIMEMessageExA
GetTaskmanWindow
SetForegroundWindow
ChangeClipboardChain
DrawMenuBarTemp
SetSystemCursor
CharToOemBuffA
Sections
.idata Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.itext Size: 280KB - Virtual size: 283KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ