Static task
static1
Behavioral task
behavioral1
Sample
ddb3b6d2bcc668e25d5d3ff0fe17efda_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddb3b6d2bcc668e25d5d3ff0fe17efda_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ddb3b6d2bcc668e25d5d3ff0fe17efda_JaffaCakes118
-
Size
163KB
-
MD5
ddb3b6d2bcc668e25d5d3ff0fe17efda
-
SHA1
4c1ba6ef0a1eabdae3d76b95e01368258723cf1a
-
SHA256
dd19071ad351d50e311bc4b94ac8436819c5fb8fef8de4df315942fcab975ce2
-
SHA512
e64ab5022b35942695a3892d0db736499f5d9d6d2c42ce035b00c74e61c372013c38a62e75ebc2e558406b569e108f50dbf60a765b9cbc738888ee52d3e94da6
-
SSDEEP
3072:sGJv1F3OETXHsBRZX9jJRXBCIW4a29/ZDvN/zzo++cHG6F8y7Vy:zv1F3fbMn9VI4a2BZxzXHGq8y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ddb3b6d2bcc668e25d5d3ff0fe17efda_JaffaCakes118
Files
-
ddb3b6d2bcc668e25d5d3ff0fe17efda_JaffaCakes118.exe windows:4 windows x86 arch:x86
58a2ac4218701605ca3abc997cee7dbf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memmove
pow
log
sin
srand
user32
GetSystemMetrics
TranslateMessage
GetKeyboardLayout
GetIconInfo
SetCursor
DrawMenuBar
InsertMenuItemA
GetClassLongA
IsDialogMessageW
EqualRect
GetDlgItem
GetWindowRect
IsRectEmpty
PtInRect
LoadIconA
DestroyWindow
SystemParametersInfoA
ChildWindowFromPoint
CreatePopupMenu
WaitMessage
CheckMenuItem
SetParent
RemovePropA
DefMDIChildProcA
GetKeyNameTextA
EmptyClipboard
CloseClipboard
BeginPaint
GetKeyboardLayoutList
ScreenToClient
GetClassInfoA
GetCapture
TranslateMDISysAccel
LoadBitmapA
GetCursor
GetMenu
GetWindowLongA
GetSysColorBrush
SetClipboardData
GetClipboardData
CreateWindowExA
DispatchMessageW
GetPropA
PostMessageA
GetWindowPlacement
GetTopWindow
UnregisterClassA
GetMessagePos
MoveWindow
FindWindowA
GetWindowTextA
GetClientRect
ShowOwnedPopups
IsWindowEnabled
CreateMenu
IsWindowVisible
GetMenuState
GetKeyboardState
MapVirtualKeyA
WindowFromPoint
CallNextHookEx
GetDCEx
CharNextA
IsIconic
OemToCharA
LoadKeyboardLayoutA
CharLowerBuffA
CharLowerA
SetWindowPlacement
GetForegroundWindow
TrackPopupMenu
GetScrollInfo
ClientToScreen
PostQuitMessage
CharUpperBuffA
RedrawWindow
ReleaseCapture
GetLastActivePopup
DrawIcon
FillRect
ShowScrollBar
SetWindowLongA
CallWindowProcA
GetFocus
DefWindowProcA
ScrollWindow
wsprintfA
DestroyIcon
PeekMessageW
MsgWaitForMultipleObjects
EndPaint
DefFrameProcA
DrawFrameControl
GetClassNameA
SetTimer
OffsetRect
GetKeyboardLayoutNameA
IntersectRect
SetActiveWindow
MapWindowPoints
SendMessageA
SetScrollRange
GetScrollRange
CreateIcon
ActivateKeyboardLayout
DrawEdge
GetScrollPos
CharToOemA
GetWindow
PeekMessageA
SendMessageW
SetScrollInfo
SetWindowLongW
SetPropA
SetClassLongA
GetMenuItemInfoA
IsWindow
MessageBeep
LoadStringA
GetMenuItemCount
RegisterClassA
GetWindowThreadProcessId
DeleteMenu
IsZoomed
GetKeyState
LoadCursorA
InvalidateRect
ReleaseDC
SetRect
DestroyCursor
GetParent
SetMenuItemInfoA
IsDialogMessageA
DrawAnimatedRects
DrawTextA
EnableScrollBar
InsertMenuA
SetWindowPos
DrawIconEx
GetDesktopWindow
SetFocus
GetSubMenu
DestroyMenu
CharNextW
SetMenu
RemoveMenu
SetForegroundWindow
MessageBoxA
GetSystemMenu
GetDC
GetActiveWindow
FrameRect
GetKeyboardType
InflateRect
ShowWindow
GetMenuStringA
OpenClipboard
GetWindowDC
SetWindowsHookExA
AdjustWindowRectEx
GetMenuItemID
IsWindowUnicode
SetScrollPos
UnhookWindowsHookEx
UpdateWindow
GetWindowLongW
DispatchMessageA
EnumThreadWindows
RegisterClipboardFormatA
EnableMenuItem
EnumChildWindows
GetCursorPos
EnumWindows
KillTimer
SetWindowTextA
SetCapture
kernel32
FreeLibrary
GetStartupInfoA
GetCPInfo
GetModuleFileNameA
WideCharToMultiByte
SetEndOfFile
HeapFree
ResetEvent
GetCurrentThread
DeleteFileA
GlobalAlloc
CreateThread
GetCurrentThreadId
MoveFileExA
SetErrorMode
FreeResource
EnumCalendarInfoA
VirtualAlloc
SetEvent
GetStringTypeW
GetFullPathNameA
EnterCriticalSection
LoadLibraryExA
GetStdHandle
GetDiskFreeSpaceA
ExitThread
GetCurrentProcessId
InitializeCriticalSection
WriteFile
CloseHandle
GetVersionExA
GetACP
LoadResource
GetProcessHeap
lstrlenA
WaitForSingleObject
GetFileType
GetTickCount
GetModuleHandleA
LocalAlloc
DeleteCriticalSection
Sleep
GlobalDeleteAtom
CreateEventA
CreateFileA
GetUserDefaultLCID
lstrcpynA
SizeofResource
lstrcpyA
FormatMessageA
GetCurrentProcess
GetOEMCP
LockResource
lstrcmpA
GetLocalTime
VirtualAllocEx
GlobalAddAtomA
SetHandleCount
VirtualFree
GetCommandLineA
LocalFree
VirtualQuery
ReadFile
SetLastError
MulDiv
HeapAlloc
GetLastError
GetThreadLocale
GetEnvironmentStrings
GetStringTypeA
MoveFileA
CompareStringA
RaiseException
lstrcmpiA
FindClose
GetLocaleInfoA
ExitProcess
LoadLibraryA
GetFileSize
SetThreadLocale
lstrcatA
GlobalFindAtomA
GetSystemDefaultLangID
GetFileAttributesA
Sections
CODE Size: 152KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: 7KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE