Static task
static1
Behavioral task
behavioral1
Sample
de0b0012abc4a486c692151753d2b159_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de0b0012abc4a486c692151753d2b159_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
de0b0012abc4a486c692151753d2b159_JaffaCakes118
-
Size
136KB
-
MD5
de0b0012abc4a486c692151753d2b159
-
SHA1
7936f72f93d8e8a981c07edf58a9f50250ef6a86
-
SHA256
88b0515b3b63af2b5a16829e7b9e67f495f633414fa72ddbcb615919b263dd35
-
SHA512
b36ffee44dca931d9dc808eabc9105d48b329d5819f2cea0ffcad3839f91057d62e5effce6ba336b415c3c5077a67c19e619075bd9fb294d5975af815e4cd5c5
-
SSDEEP
1536:pkPEC/fq5/HJKBE5BjqDTPlB7atjSjD0t1VueqLNvkBluiXlbzS5DQuGfR:uK5PgBWS3ISjDG16N8BlxlvSt+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource de0b0012abc4a486c692151753d2b159_JaffaCakes118
Files
-
de0b0012abc4a486c692151753d2b159_JaffaCakes118.exe windows:4 windows x86 arch:x86
f57e842e75afa1553003b8566917a24a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCurrentProcess
SetFilePointer
FlushFileBuffers
GetFullPathNameA
GetCPInfo
GetOEMCP
FileTimeToLocalFileTime
RtlUnwind
HeapFree
HeapAlloc
GetDriveTypeA
ExitProcess
GetTimeZoneInformation
GetSystemTime
GetStartupInfoA
GetCommandLineA
GlobalFindAtomA
HeapReAlloc
HeapSize
GetACP
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetModuleHandleA
GetCurrentDirectoryA
lstrcpyA
lstrcatA
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
GlobalUnlock
GlobalFree
TlsAlloc
LocalAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetCurrentProcessId
InitializeCriticalSection
lstrcpynA
GetLastError
SetLastError
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
LocalFree
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GetPrivateProfileIntA
GetPrivateProfileStringA
GetPrivateProfileSectionNamesA
GetLocalTime
FileTimeToSystemTime
SystemTimeToFileTime
lstrlenA
CreateToolhelp32Snapshot
Process32First
OpenProcess
GetExitCodeProcess
TerminateProcess
Process32Next
CreateFileA
WriteFile
CloseHandle
GetVersion
Sleep
GetProfileIntA
GetProfileStringA
LoadLibraryA
GetProcAddress
FreeLibrary
FindFirstFileA
FindNextFileA
FindClose
CopyFileA
GetSystemDirectoryA
GetWindowsDirectoryA
GetFileAttributesA
SetFileAttributesA
CreateDirectoryA
DeleteFileA
RaiseException
MoveFileA
user32
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
DefWindowProcA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
GetSysColorBrush
DestroyMenu
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
GetWindowTextA
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
LoadStringA
UnhookWindowsHookEx
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
PostMessageA
PostQuitMessage
MessageBoxA
SendMessageA
LoadCursorA
FindWindowExA
wsprintfA
SetMenuItemBitmaps
UnregisterClassA
gdi32
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
ScaleViewportExtEx
GetDeviceCaps
GetStockObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
SelectObject
RestoreDC
SaveDC
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
CreateBitmap
DeleteDC
DeleteObject
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
shell32
SHGetSpecialFolderPathA
SHFileOperationA
ShellExecuteA
comctl32
ord17
wininet
InternetOpenUrlA
InternetQueryDataAvailable
InternetReadFile
InternetOpenA
InternetCloseHandle
Sections
.text Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ