Static task
static1
Behavioral task
behavioral1
Sample
e5333102bbeb084f108be4bb0ec43c77_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e5333102bbeb084f108be4bb0ec43c77_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e5333102bbeb084f108be4bb0ec43c77_JaffaCakes118
-
Size
816KB
-
MD5
e5333102bbeb084f108be4bb0ec43c77
-
SHA1
6dab430563b675a7b2862e22e4baecc1fdf1e9bc
-
SHA256
5c320dfd6b11443cd9a1da5bc57d14cfdd5aa74029bd4ee7380af5ae5c4d3f2d
-
SHA512
24d931d32f14a1f919e938a6bfbb97709207f3780bd49c55087d5e295fb10b82045526ca830e948dc9f772f953e38a495308089620e77d124cfbb2f03216e751
-
SSDEEP
12288:/EXU9kmhfj8ZPS9FMjZR+5vyY5ENiy1RvvcYmO:/EXU9kmhfwZaIR+5qY5ENR/vvcFO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource e5333102bbeb084f108be4bb0ec43c77_JaffaCakes118
Files
-
e5333102bbeb084f108be4bb0ec43c77_JaffaCakes118.exe windows:4 windows x86 arch:x86
5407928a6a0efb47faf121dfe6cfef1d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
RaiseException
TerminateProcess
HeapReAlloc
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sleep
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetProfileStringA
InterlockedExchange
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentProcess
SetErrorMode
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SizeofResource
GetLastError
GlobalFlags
lstrcpynA
CloseHandle
lstrcmpA
GetCurrentThread
LocalFree
GetModuleFileNameA
MulDiv
SetLastError
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
GetVersion
GetCurrentThreadId
lstrcpyA
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
GetProcAddress
GlobalFree
LockResource
FindResourceA
LoadResource
VirtualProtect
lstrcatA
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
GlobalAlloc
GlobalLock
GlobalUnlock
lstrlenA
GetProcessHeap
HeapFree
HeapAlloc
GetStdHandle
user32
ScreenToClient
AdjustWindowRectEx
SetFocus
GetFocus
DispatchMessageA
PeekMessageA
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
PostMessageA
IsDialogMessageA
SetWindowTextA
ShowWindow
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
ClientToScreen
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
WindowFromPoint
PostQuitMessage
ValidateRect
TranslateMessage
GetMessageA
LoadStringA
DestroyMenu
GetClassNameA
GetSysColorBrush
GetTopWindow
MessageBoxA
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetMenuItemID
TrackPopupMenu
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
CreateWindowExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
LoadMenuA
GetSubMenu
DrawFocusRect
IsIconic
GetSystemMetrics
DrawIcon
GetSystemMenu
AppendMenuA
LoadIconA
EnumChildWindows
KillTimer
GetCursorPos
PtInRect
RedrawWindow
CopyIcon
GetWindowRect
GetParent
GetDC
LoadCursorA
EnableWindow
CloseClipboard
UnregisterClassA
HideCaret
ReleaseDC
InflateRect
GetSysColor
InvalidateRect
IsWindow
SetWindowLongA
GetClientRect
SetTimer
SetCursor
SendMessageA
CopyRect
IsWindowVisible
DestroyCursor
EmptyClipboard
SetClipboardData
OpenClipboard
IsWindowUnicode
CharNextA
DefDlgProcA
ExcludeUpdateRgn
ShowCaret
SetWindowsHookExA
gdi32
SaveDC
RestoreDC
SelectObject
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
DeleteDC
DeleteObject
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetTextMetricsA
GetCharWidthA
GetTextExtentPoint32A
GetObjectA
CreateFontIndirectA
CreateDIBitmap
PatBlt
GetTextExtentPointA
BitBlt
CreateCompatibleDC
GetStockObject
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegSetValueExA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueA
shell32
ShellExecuteA
comctl32
ord17
Sections
.text Size: 124KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.titan Size: 612KB - Virtual size: 611KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ