Static task
static1
Behavioral task
behavioral1
Sample
eeb980af711beb0f69516456f7be7494_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eeb980af711beb0f69516456f7be7494_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eeb980af711beb0f69516456f7be7494_JaffaCakes118
-
Size
408KB
-
MD5
eeb980af711beb0f69516456f7be7494
-
SHA1
b949c543454a5608440274365d86b07e6ce65a86
-
SHA256
3877a5a735bbe57c2c56052db2e8aa92662d3cda300fc89bbb0674fb89a8df15
-
SHA512
83cac353cd0a41a532b56f0d6a0add5f1e265bc18804c4270a47d207089d6a06392e731bae65f870219d7f429eb56761a5954da5a62064d90621a9b44fbe8960
-
SSDEEP
6144:mFyDAeaSelFAOhfrRa9ZqfA3RqnCTAH+QRScnKdM28F8ZZ:AyDATllFfTeqfop0JkcnKiS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource eeb980af711beb0f69516456f7be7494_JaffaCakes118
Files
-
eeb980af711beb0f69516456f7be7494_JaffaCakes118.exe windows:5 windows x86 arch:x86
4a0ae3c2e42c21f7854e623bcc91c5fb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadImageA
InvalidateRect
GetWindowDC
GetGUIThreadInfo
GetKeyboardType
DestroyWindow
LoadStringA
MessageBoxA
CharNextA
CreatePopupMenu
EnableWindow
EndPaint
SetWindowRgn
GetClientRect
GetCursorPos
GetDC
GetDesktopWindow
GetDlgCtrlID
DialogBoxParamA
GetDlgItemTextA
GetKeyState
GetSysColor
GetSystemMetrics
GetWindowLongA
GetWindowPlacement
GetWindowRect
LoadBitmapA
LoadIconA
DefWindowProcA
GetDlgItem
FillRect
GetMessageA
PostMessageA
PostQuitMessage
RegisterClassExA
ReleaseDC
SendDlgItemMessageA
SendMessageA
SetActiveWindow
SetDlgItemTextA
SetFocus
SetForegroundWindow
SetLayeredWindowAttributes
SetMenuItemBitmaps
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
TrackPopupMenu
UpdateWindow
CreateWindowExA
CreateDialogParamA
CloseWindow
ChangeDisplaySettingsA
BeginPaint
AppendMenuA
wsprintfA
SetRect
UnregisterClassA
GetWindowThreadProcessId
SetCursor
GetTopWindow
TranslateMessage
ValidateRect
WindowFromPoint
MoveWindow
IsDialogMessageA
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetActiveWindow
CreateDialogIndirectParamA
IsWindowEnabled
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
IsWindowVisible
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
PtInRect
CallWindowProcA
SystemParametersInfoA
GetWindow
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
LoadCursorA
GetSysColorBrush
GetClassNameA
DestroyMenu
UnhookWindowsHookEx
ExitWindowsEx
IsIconic
DrawIcon
GetParent
OffsetRect
CopyRect
comdlg32
ChooseColorA
GetOpenFileNameA
GetSaveFileNameA
shell32
ShellExecuteA
SHChangeNotify
advapi32
StartServiceA
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyA
RegEnumKeyA
RegSetValueA
RegQueryValueExA
RegQueryValueA
RegOpenKeyExA
RegFlushKey
RegCreateKeyA
RegCloseKey
OpenServiceA
OpenSCManagerA
LookupPrivilegeValueA
OpenProcessToken
RegSetValueExA
AdjustTokenPrivileges
CloseServiceHandle
ControlService
CreateServiceA
DeleteService
GetTokenInformation
wininet
InternetOpenW
InternetOpenUrlW
InternetReadFile
InternetCloseHandle
gdi32
CombineRgn
CreateRectRgn
CreateFontIndirectA
GetStockObject
GetDeviceCaps
StretchBlt
RestoreDC
SetMapMode
Escape
SetViewportOrgEx
OffsetViewportOrgEx
GetBkColor
GetDIBits
SaveDC
GetObjectA
SetViewportExtEx
CreateBitmap
PtVisible
SetWindowExtEx
ScaleViewportExtEx
TextOutA
SwapBuffers
SetTextColor
SetPixelFormat
SetBkMode
SetBkColor
SelectObject
Polygon
MoveToEx
LineTo
DeleteObject
DeleteDC
CreateSolidBrush
CreatePen
CreateFontA
CreateCompatibleDC
CreateCompatibleBitmap
ChoosePixelFormat
BitBlt
RectVisible
ScaleWindowExtEx
ExtTextOutA
GetClipBox
comctl32
ImageList_LoadImageA
ord17
netapi32
NetUserAdd
kernel32
GetCurrentProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
HeapReAlloc
GetLastError
OpenProcess
OpenFileMappingA
MapViewOfFile
MapUserPhysicalPages
UnhandledExceptionFilter
LoadResource
LoadLibraryA
GlobalUnlock
AllocateUserPhysicalPages
GlobalMemoryStatusEx
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryA
GetVersion
GetUserDefaultLangID
CreateDirectoryA
CloseHandle
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
HeapCreate
VirtualFree
VirtualAlloc
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleHandleA
WideCharToMultiByte
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
RaiseException
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
HeapSize
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
CreateFileA
LockResource
Sections
.hex Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.recode Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 344KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 218KB - Virtual size: 217KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ