Static task
static1
Behavioral task
behavioral1
Sample
e0ed2519c5e00d9e95b2d5463c9c3133_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0ed2519c5e00d9e95b2d5463c9c3133_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e0ed2519c5e00d9e95b2d5463c9c3133_JaffaCakes118
-
Size
508KB
-
MD5
e0ed2519c5e00d9e95b2d5463c9c3133
-
SHA1
24a4f31bc8d950eac1ed29411ec5d95fcc133b8f
-
SHA256
ab27a1ec9ad75a2a3b623b1ea6aa28b409cb67e3cb7b7e96a3175413b9974a30
-
SHA512
9f95660c6088ed03996a3512eef5556a09c63124e6810c8d2dd12ca0d7cfd2005a6dd2f3061312e856afa0cb4c9e4f484c0cd7f2d875cb649830752e40d0e208
-
SSDEEP
12288:fdEo9MMnMMMMMxn+DnbQcLAwtfGP75z+J607t/rP7M:fdB9MMnMMMMMUDbQCfK7h4N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0ed2519c5e00d9e95b2d5463c9c3133_JaffaCakes118
Files
-
e0ed2519c5e00d9e95b2d5463c9c3133_JaffaCakes118.exe windows:4 windows x86 arch:x86
d42e942269460f759fb62eff0fe18fd2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
RegisterClassA
DdeNameService
DestroyMenu
SetForegroundWindow
GetActiveWindow
SetPropA
MapWindowPoints
GetClipboardData
GetClassInfoExA
GetWindowTextA
GetMenuStringA
EndDeferWindowPos
CallWindowProcA
IsClipboardFormatAvailable
MessageBoxIndirectA
GetWindowRect
CreateIcon
DdeCmpStringHandles
EnableMenuItem
SendDlgItemMessageA
GetQueueStatus
CharPrevA
GetScrollPos
CloseClipboard
ShowCaret
SetRect
SetKeyboardState
BeginDeferWindowPos
SetWindowRgn
GetWindowLongA
FrameRect
GetFocus
LoadIconA
DrawFrameControl
CharLowerBuffA
RegisterClipboardFormatA
TrackPopupMenu
SetMenuDefaultItem
GetCaretPos
DefWindowProcA
SetClipboardData
GetMenuState
SetActiveWindow
GetTabbedTextExtentA
FillRect
DdeQueryStringA
InvalidateRgn
TranslateMessage
GetClientRect
GetDlgItem
SetTimer
SetCursorPos
CheckMenuItem
IsRectEmpty
SubtractRect
PostMessageA
DdeGetData
GetMenuItemCount
DrawMenuBar
CreateCaret
CreateAcceleratorTableA
CharUpperA
IsDialogMessageA
CopyAcceleratorTableA
GetMenu
SetCursor
FindWindowW
InsertMenuA
WaitMessage
DdeUninitialize
DdeQueryConvInfo
TabbedTextOutA
CreateCursor
IsWindowVisible
GetClipboardFormatNameA
SetMenu
IsZoomed
InflateRect
KillTimer
GetSysColor
IsWindow
GetDoubleClickTime
LockWindowUpdate
GetSystemMenu
CopyRect
BeginPaint
GetWindowThreadProcessId
SetWindowTextA
GetMenuItemID
SetWindowsHookExW
PostMessageW
PeekMessageA
GetLastActivePopup
DdeGetLastError
EndPaint
ToAscii
GetPropA
GetWindowTextLengthA
EnumThreadWindows
CharUpperBuffA
SetWindowContextHelpId
SetMenuItemInfoA
AttachThreadInput
EnableWindow
GetWindowDC
GetCursor
EqualRect
SetWindowPos
SetFocus
MoveWindow
MessageBoxA
GetDCEx
GetMessagePos
RemoveMenu
GetCursorPos
CreateWindowExA
EndDialog
RegisterClassExA
GetScrollInfo
DdeSetUserHandle
AdjustWindowRect
BringWindowToTop
DeferWindowPos
SystemParametersInfoA
OffsetRect
TranslateMDISysAccel
DdeCreateStringHandleA
CallNextHookEx
SetWindowLongA
VkKeyScanW
ScreenToClient
PostThreadMessageA
DialogBoxParamA
PtInRect
UnregisterClassA
DdeClientTransaction
UpdateWindow
GetParent
GetClassInfoA
DrawFocusRect
DdePostAdvise
DrawTextA
CharToOemA
EnumClipboardFormats
ClientToScreen
CharLowerA
WaitForInputIdle
CharToOemBuffA
DestroyAcceleratorTable
IntersectRect
GetMenuItemInfoA
DdeConnect
wsprintfA
GetAsyncKeyState
ShowScrollBar
DdeAbandonTransaction
SetScrollRange
DefMDIChildProcA
DdeCreateDataHandle
GetMessageTime
LoadBitmapA
LoadAcceleratorsA
SetWindowsHookExA
DdeFreeStringHandle
MsgWaitForMultipleObjects
SetCaretPos
FindWindowA
ShowWindow
CreateDialogParamA
DispatchMessageA
DestroyCursor
ReleaseDC
GetUpdateRect
SendMessageA
DdeInitializeA
InvalidateRect
GetCaretBlinkTime
CreatePopupMenu
GetUpdateRgn
DdeDisconnect
GetSubMenu
DestroyWindow
GetForegroundWindow
DefFrameProcA
GetClassNameA
VkKeyScanA
WindowFromPoint
CreateMenu
EmptyClipboard
LoadCursorA
PostQuitMessage
SetCapture
GetKeyState
DeleteMenu
GetDC
AdjustWindowRectEx
IsChild
CharUpperBuffW
ClipCursor
GetKeyboardState
GetDesktopWindow
SetScrollInfo
ModifyMenuA
IsIconic
RemovePropA
GetWindowRgn
CharNextA
AppendMenuA
LoadStringA
IsWindowEnabled
GetIconInfo
keybd_event
DrawIcon
DestroyCaret
GetWindow
GetSystemMetrics
GetCapture
ShowCursor
ReleaseCapture
SetScrollPos
DestroyIcon
OpenClipboard
GetKeyboardLayout
WinHelpA
HideCaret
LoadImageA
UnhookWindowsHookEx
DdeFreeDataHandle
PeekMessageW
IsCharAlphaA
SetDlgItemTextA
OemToCharA
MessageBeep
CharLowerBuffW
SetParent
ole32
OleSave
OleLoad
ws2_32
WSAConnect
setsockopt
samlib
SamConnectWithCreds
SamConnect
ddraw
DirectDrawEnumerateA
kernel32
GlobalAlloc
FindClose
ReleaseSemaphore
TlsGetValue
SizeofResource
EnterCriticalSection
SetLocalTime
SystemTimeToFileTime
GetSystemDefaultLCID
TlsFree
GetTickCount
IsDBCSLeadByte
DuplicateHandle
GetCurrentDirectoryA
GlobalFree
VirtualFree
RaiseException
ResumeThread
DeleteFileA
TerminateProcess
GetWindowsDirectoryA
WriteFile
FormatMessageW
GetUserDefaultLangID
MultiByteToWideChar
GetStdHandle
SetCurrentDirectoryA
SetHandleCount
ReadFile
LockFile
SetEndOfFile
DeleteCriticalSection
GetCPInfo
WaitForSingleObject
CreateSemaphoreA
GetDriveTypeA
SetFilePointer
GetCurrentThreadId
CreateFileA
FileTimeToLocalFileTime
CreateEventA
GetACP
GetTempPathA
GetLastError
GetEnvironmentStrings
GetVersionExA
GetFileType
GetEnvironmentStringsW
CreateProcessA
SetEnvironmentVariableA
TlsAlloc
LeaveCriticalSection
SearchPathA
GlobalAddAtomA
InterlockedIncrement
UnhandledExceptionFilter
lstrcpynA
GetCurrentProcessId
LCMapStringA
InterlockedDecrement
GetLocaleInfoA
VirtualAlloc
CreateDirectoryA
RtlUnwind
SetEvent
GetTimeZoneInformation
_llseek
SetFileAttributesA
MulDiv
GetVolumeInformationA
GetSystemTime
lstrcmpA
GetCommandLineA
FindResourceA
GetCurrentProcess
LoadResource
lstrcmpiW
GetStringTypeA
HeapReAlloc
GetFileTime
FlushFileBuffers
FreeEnvironmentStringsA
_lread
HeapCreate
GetTempFileNameA
ResetEvent
HeapDestroy
IsBadCodePtr
GetShortPathNameA
GetOEMCP
GetProfileStringA
lstrcpyA
FreeLibrary
SetFileTime
GetExitCodeProcess
FormatMessageA
GetFullPathNameA
VirtualQuery
CreateThread
_lclose
GetSystemDirectoryA
UnlockFile
GetModuleFileNameW
GetDateFormatA
GetLocalTime
IsBadReadPtr
SetLastError
GetProcAddress
ExitProcess
GetVersion
_lwrite
lstrcmpiA
GlobalLock
GlobalSize
VirtualProtect
LockResource
GetUserDefaultLCID
GetModuleFileNameA
FreeResource
GetStringTypeW
RemoveDirectoryA
MoveFileA
GetSystemDefaultLangID
GetStringTypeExA
LoadLibraryA
CompareStringW
FreeEnvironmentStringsW
FindNextFileA
FileTimeToSystemTime
lstrcatA
GetFileAttributesA
lstrlenA
SetStdHandle
GlobalDeleteAtom
CloseHandle
InitializeCriticalSection
LoadLibraryExA
FlushInstructionCache
GlobalReAlloc
HeapSize
WideCharToMultiByte
SetErrorMode
HeapFree
GlobalHandle
FindFirstFileA
GlobalUnlock
GetStartupInfoA
LCMapStringW
CreateProcessW
Sleep
TlsSetValue
WinExec
GetSystemInfo
CompareStringA
ExitThread
HeapAlloc
GetModuleHandleA
advapi32
RegEnumKeyA
RegQueryValueA
LookupPrivilegeValueA
OpenProcessToken
RegEnumValueW
AdjustTokenPrivileges
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegEnumValueA
RegDeleteKeyW
ReportEventA
RegSetValueExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegOpenKeyW
RegisterEventSourceA
RegQueryValueExW
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyW
RegCreateKeyA
RegQueryInfoKeyA
RegSetValueExW
RegDeleteValueW
RegOpenKeyA
RegEnumKeyW
RegSetValueA
DeregisterEventSource
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 52KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 410KB - Virtual size: 409KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ