Static task
static1
Behavioral task
behavioral1
Sample
ea907b0c3770b32892d373392c63a795_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea907b0c3770b32892d373392c63a795_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea907b0c3770b32892d373392c63a795_JaffaCakes118
-
Size
180KB
-
MD5
ea907b0c3770b32892d373392c63a795
-
SHA1
e44d5614dc61d2e65650b5475bf9d0679643a2b1
-
SHA256
a2685305610fc695d2d18945bef3233cef0309a56d497cd8a5c1a90239a55e33
-
SHA512
78f0bcd26343a2a5f1361542bb797d91793c9cc04a41e5f3a429c150b4f792de3ce37c18452b8721817ea97d6e3a751b50e458ee05140d42effcfaf96c5c3d7f
-
SSDEEP
3072:8lthFHO3kTtFHhzpQhNB1vhfzbQmBKwDQCLjjFs1QBdoVl1kF62BZkira3sPazkB:8lthF/TtFBzAtfzJBKzyjyQXckZJacCK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea907b0c3770b32892d373392c63a795_JaffaCakes118
Files
-
ea907b0c3770b32892d373392c63a795_JaffaCakes118.exe windows:4 windows x86 arch:x86
4a05f8d52f92041c02d1ecf688d7e1f4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAlloc
lstrlenA
lstrcmpA
GlobalLock
GlobalSize
GetProcAddress
GetCurrentThreadId
FormatMessageA
WideCharToMultiByte
MultiByteToWideChar
GlobalDeleteAtom
GlobalAddAtomA
SetErrorMode
GetFileAttributesA
GlobalGetAtomNameW
GetTickCount
CreateProcessA
Sleep
CreateEventA
GetVersionExA
FreeLibrary
MulDiv
RtlZeroMemory
GetLocaleInfoA
RtlMoveMemory
LocalReAlloc
GetPrivateProfileStringA
WaitForSingleObject
ExitThread
lstrcmpiA
GetProfileStringA
SetEvent
GetProfileIntA
CreateThread
CloseHandle
GetWindowsDirectoryA
LoadLibraryA
ExitProcess
lstrcpynA
SearchPathA
GetDriveTypeA
lstrcatA
GlobalUnlock
GlobalFree
LocalFree
LocalAlloc
GetStdHandle
GetOEMCP
GetACP
GetModuleFileNameA
UnhandledExceptionFilter
RtlUnwind
GetLastError
VirtualAlloc
VirtualFree
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetVersion
GetCommandLineA
GetEnvironmentStrings
GetStartupInfoA
GetModuleHandleA
GetFileType
TlsSetValue
TlsAlloc
TlsGetValue
lstrcpyA
GetCPInfo
user32
SystemParametersInfoA
FindWindowA
SetForegroundWindow
SetRectEmpty
SetMenu
CharLowerBuffA
SetMenuItemInfoA
GetMenuItemInfoA
InsertMenuA
DeleteMenu
GetWindowPlacement
DestroyMenu
CreateMenu
RemoveMenu
GetMenuItemCount
GetDesktopWindow
CheckMenuItem
EqualRect
FrameRect
DrawIcon
DrawTextA
UnhookWindowsHook
TranslateMessage
TranslateAcceleratorA
GetMessageA
SetWindowsHookA
IsWindowEnabled
RedrawWindow
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
LoadImageA
IsZoomed
GetMenuState
PostQuitMessage
DestroyIcon
RegisterClipboardFormatA
GetClassNameA
ShowCursor
GetAsyncKeyState
GetKeyState
UpdateWindow
PeekMessageA
MsgWaitForMultipleObjects
GetWindow
DestroyWindow
CreateWindowExA
DrawMenuBar
OffsetRect
MapWindowPoints
GetDlgItemTextA
SetDlgItemTextA
SendDlgItemMessageA
CheckDlgButton
EnableWindow
GetDlgCtrlID
WinHelpA
LoadStringA
SetWindowTextA
EndDialog
GetFocus
IsDlgButtonChecked
GetDlgItem
SetFocus
CheckRadioButton
SetDlgItemInt
GetDlgItemInt
MessageBeep
DialogBoxParamA
GetWindowTextA
SetWindowLongA
CallWindowProcA
PostMessageA
wsprintfA
LoadCursorA
RegisterClassA
DefWindowProcA
BeginPaint
GetClientRect
GetSysColor
FillRect
EndPaint
SetCapture
GetParent
GetWindowRect
CopyRect
ReleaseCapture
KillTimer
GetDC
ScreenToClient
InvertRect
LoadIconA
GetSubMenu
LoadAcceleratorsA
CopyAcceleratorTableA
InflateRect
IntersectRect
MoveWindow
InvalidateRect
IsCharAlphaNumericA
IsCharAlphaA
GetDialogBaseUnits
CharPrevA
GetWindowThreadProcessId
wvsprintfA
ClientToScreen
ReleaseDC
ValidateRect
GetWindowLongA
SendMessageA
SetTimer
GetMessagePos
PtInRect
MessageBoxA
GetMenu
EnableMenuItem
IsWindowVisible
GetActiveWindow
IsRectEmpty
GetSystemMetrics
SetRect
AdjustWindowRect
ShowWindow
BringWindowToTop
SetActiveWindow
IsIconic
SetCursor
SetParent
SetWindowPos
IsWindow
ModifyMenuA
LoadMenuA
DispatchMessageA
gdi32
Polygon
SetWindowExtEx
SetWindowOrgEx
SetViewportExtEx
SetViewportOrgEx
SetMapMode
SetTextColor
SelectObject
GetStockObject
DeleteObject
CreateSolidBrush
CreatePatternBrush
CreateBitmap
GetTextExtentPoint32A
GetDeviceCaps
GetObjectA
SelectPalette
CreateFontIndirectA
SetROP2
SetBkMode
Rectangle
GetBkMode
GetROP2
CreatePen
DeleteDC
StretchBlt
CreateCompatibleDC
TextOutA
PatBlt
CreateCompatibleBitmap
RestoreDC
ExcludeClipRect
SaveDC
CreatePalette
GetPaletteEntries
DeleteMetaFile
CloseMetaFile
StretchDIBits
SetStretchBltMode
RealizePalette
CreateMetaFileA
MoveToEx
LineTo
GetSystemPaletteEntries
GetSystemPaletteUse
SetBkColor
GetDIBits
comctl32
ord17
ord6
CreateToolbarEx
shell32
ShellAboutA
ExtractIconA
DragQueryFileA
DragFinish
SHGetFileInfoA
DragAcceptFiles
winmm
OpenDriver
CloseDriver
mciSendStringA
mciSendCommandA
sndPlaySoundA
mciGetErrorStringA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE