Static task
static1
Behavioral task
behavioral1
Sample
eeaa558ffb76aa4e22b59450f45a30b2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eeaa558ffb76aa4e22b59450f45a30b2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eeaa558ffb76aa4e22b59450f45a30b2_JaffaCakes118
-
Size
232KB
-
MD5
eeaa558ffb76aa4e22b59450f45a30b2
-
SHA1
d9c06b52931aa764ffe73af0f1ce77eb83565ac8
-
SHA256
b486a3f5936e1fb4d49189902332d04b16b20877362bc271de788c3512c7e1b8
-
SHA512
8fc295ab1da44ad34af3dede0a27f1f64be5bac454ec675646ae0cfb48f38d4dfbacbde47fc285dcd43db6b3f4ccbc5070133806db2f3a4d1e2eb5dfc6395c21
-
SSDEEP
3072:uuupGPGWC/l872PEbP/8G9pk91hrM/CbIhxJE9Yx15yN/zIUo0I/9NFq1BLr4:jQl87nD0OpZxdeNC9NFq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eeaa558ffb76aa4e22b59450f45a30b2_JaffaCakes118
Files
-
eeaa558ffb76aa4e22b59450f45a30b2_JaffaCakes118.exe windows:4 windows x86 arch:x86
dcdd1ffd61030a49f4d5e2a793bf2e96
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
RaiseException
HeapAlloc
HeapFree
TerminateProcess
HeapSize
HeapReAlloc
GetACP
GetTimeZoneInformation
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
GetCommandLineA
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetStartupInfoA
RtlUnwind
GetProfileStringA
GetTickCount
FileTimeToLocalFileTime
FileTimeToSystemTime
SetErrorMode
SizeofResource
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GetProcessVersion
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
GetFileTime
GetFileSize
GetFileAttributesA
FormatMessageA
LocalFree
GetThreadLocale
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GetCurrentProcess
DuplicateHandle
GlobalFree
GetModuleFileNameA
GlobalAlloc
lstrcmpA
GetCurrentThread
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
GlobalLock
GlobalUnlock
SetLastError
FreeLibrary
FindResourceA
LoadResource
LockResource
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
LoadLibraryA
GetProcAddress
ReadFile
WriteFile
GetLastError
GetOverlappedResult
ClearCommError
WaitCommEvent
GetCommState
SetCommState
CreateFileA
SetupComm
SetCommTimeouts
CreateThread
CreateEventA
SetCommMask
EscapeCommFunction
PurgeComm
CloseHandle
Sleep
GetCurrentDirectoryA
MulDiv
VirtualFree
user32
SetRect
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
PostThreadMessageA
GetMessageA
GetActiveWindow
ValidateRect
GetCursorPos
IsWindowEnabled
SetCursor
PostQuitMessage
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
PostMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
PeekMessageA
DispatchMessageA
GetFocus
SetActiveWindow
IsWindow
SetFocus
AdjustWindowRectEx
ScreenToClient
IsWindowVisible
CopyAcceleratorTableA
GetTopWindow
IsChild
GetCapture
WinHelpA
wsprintfA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
DestroyWindow
CreateWindowExA
SetWindowsHookExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SendMessageA
GetWindowLongA
CopyRect
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DefDlgProcA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
DrawFrameControl
DrawStateA
DrawFocusRect
GetParent
LoadImageA
InvalidateRect
EnableWindow
CharNextA
MessageBoxA
KillTimer
SetTimer
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSystemMenu
AppendMenuA
LoadIconA
InflateRect
IsWindowUnicode
GetSysColor
GetSysColorBrush
LoadCursorA
GetDesktopWindow
PtInRect
GetClassNameA
DestroyMenu
LoadStringA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
CharUpperA
MapDialogRect
SetWindowContextHelpId
EndDialog
CreateDialogIndirectParamA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
CallNextHookEx
EnableMenuItem
GetClassInfoA
GetNextDlgTabItem
TranslateMessage
gdi32
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
MoveToEx
LineTo
OffsetViewportOrgEx
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CreateBitmap
PatBlt
GetMapMode
DPtoLP
GetTextColor
GetBkColor
LPtoDP
SetViewportOrgEx
SetMapMode
SetBkMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
SetBkColor
SetTextColor
GetClipBox
Rectangle
CreatePen
DeleteObject
GetObjectA
CreateFontIndirectA
CreateDIBitmap
GetTextExtentPointA
BitBlt
CreateCompatibleDC
GetTextExtentPoint32A
comdlg32
GetSaveFileNameA
GetFileTitleA
GetOpenFileNameA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
comctl32
ord17
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
OleUninitialize
olepro32
ord253
oleaut32
VariantClear
SysFreeString
VariantTimeToSystemTime
VariantCopy
VariantChangeType
SysAllocString
SysAllocStringByteLen
SysStringLen
SysAllocStringLen
Sections
.text Size: 152KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 295KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ