Static task
static1
Behavioral task
behavioral1
Sample
ef537ae7d989a6b88c20c758ea1a6d38_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef537ae7d989a6b88c20c758ea1a6d38_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef537ae7d989a6b88c20c758ea1a6d38_JaffaCakes118
-
Size
302KB
-
MD5
ef537ae7d989a6b88c20c758ea1a6d38
-
SHA1
a7f867792611a2af7055e0411937d852d4ad4c87
-
SHA256
6e7397e561122e049b48a453d69d90eb47745cf3dedcae7b56eb4b7bd4cb0653
-
SHA512
a65ae109ee9c19d2ca08eb6e8c00995520fe262c8e0bb8d876ce07df9aeec639f2c60937ffe26e7ca3e7ba388a7c1b96a65d2a81be07f0cbc2883379e623c9bd
-
SSDEEP
6144:vpOuatq9nLtnGR9XACo5TdW+UKaG4JFW/gRVzgUEjRDrviICUj:vpO9t6ZnGLX/yZaKP4J02FartJj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef537ae7d989a6b88c20c758ea1a6d38_JaffaCakes118
Files
-
ef537ae7d989a6b88c20c758ea1a6d38_JaffaCakes118.exe windows:4 windows x86 arch:x86
457d17d5d3ace9ed921786e6c18f7009
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
lstrlenA
lstrcpyA
CreateFileA
LoadLibraryW
GetProcAddress
VirtualAlloc
ReadConsoleA
FreeLibrary
WaitForMultipleObjects
GetCurrentDirectoryA
GetCompressedFileSizeA
FileTimeToDosDateTime
SetNamedPipeHandleState
GetCPInfo
GetBinaryTypeW
RequestWakeupLatency
AddConsoleAliasA
GetProfileStringA
CancelWaitableTimer
DebugBreak
DefineDosDeviceA
GetThreadContext
InitAtomTable
FoldStringA
GetFileTime
GetCPInfoExW
GetConsoleAliasExesLengthA
CancelTimerQueueTimer
EnumTimeFormatsA
GetUserDefaultLangID
GetFileSizeEx
GlobalAlloc
GetPrivateProfileStringW
GetACP
SetFileAttributesA
GetVolumePathNameA
EnterCriticalSection
FindFirstFileExW
CreateEventW
GetEnvironmentVariableW
Process32FirstW
CreateRemoteThread
WaitNamedPipeW
GetTimeZoneInformation
GetCPInfoExA
CreateDirectoryA
GetConsoleOutputCP
FlushConsoleInputBuffer
GetNumberOfConsoleInputEvents
GetConsoleAliasExesLengthW
GetConsoleAliasesA
WaitForSingleObjectEx
GetTimeFormatW
SetThreadLocale
_lwrite
InterlockedExchange
Module32FirstW
SetFileApisToOEM
lstrlen
LoadLibraryExW
WritePrivateProfileSectionW
GlobalDeleteAtom
GlobalHandle
GetConsoleAliasesW
EnumResourceTypesA
SetLocaleInfoA
GetTimeFormatA
DuplicateHandle
VerifyVersionInfoW
SetConsoleMode
GetCompressedFileSizeW
lstrcatW
WriteProfileSectionW
WriteConsoleInputA
EnumUILanguagesA
LockFile
GetCommState
FreeEnvironmentStringsW
WriteConsoleOutputW
_lopen
GetShortPathNameA
EnumLanguageGroupLocalesW
ResetWriteWatch
SetCommTimeouts
ReadConsoleOutputAttribute
EnumSystemCodePagesA
GetConsoleWindow
GetSystemInfo
FindFirstVolumeA
VerifyVersionInfoA
CompareFileTime
GetLongPathNameW
GetDiskFreeSpaceW
FindFirstFileA
VerLanguageNameA
lstrcmpA
PeekConsoleInputA
user32
mouse_event
InsertMenuA
GetClipboardOwner
RegisterDeviceNotificationW
GetQueueStatus
GetClipboardViewer
SetWindowPos
WINNLSGetIMEHotkey
SendNotifyMessageA
OemToCharA
GetPropA
GetThreadDesktop
GetAltTabInfoW
InsertMenuW
MonitorFromWindow
EndPaint
CloseWindowStation
CharNextW
SetWindowPlacement
BringWindowToTop
CallMsgFilter
GrayStringW
GetUserObjectInformationA
CharPrevW
GetScrollRange
DestroyWindow
SendMessageA
NotifyWinEvent
DrawEdge
DlgDirSelectExW
GetSysColor
UnloadKeyboardLayout
RealGetWindowClass
CharLowerW
DdeInitializeW
SendMessageCallbackA
ShowWindowAsync
GetWindowTextLengthA
IMPQueryIMEA
MessageBeep
LoadStringW
OpenWindowStationA
ChangeMenuA
GetKeyboardLayoutNameA
SetProcessWindowStation
GetCursor
GetClipboardSequenceNumber
ArrangeIconicWindows
LoadCursorFromFileA
ImpersonateDdeClientWindow
SetParent
ShowScrollBar
UnpackDDElParam
RegisterWindowMessageA
DestroyIcon
InvalidateRect
OemToCharW
GetLastActivePopup
GetDCEx
MoveWindow
GetMenuItemRect
CharLowerBuffW
GetMenuDefaultItem
MapDialogRect
GetKeyboardState
LoadImageW
LoadBitmapW
SetMenuItemInfoA
VkKeyScanA
SetClipboardData
GetMessageA
ChangeClipboardChain
DdeFreeDataHandle
GetClipboardFormatNameW
SetWindowLongA
SetClassLongA
IsIconic
DefWindowProcW
PostThreadMessageA
ReleaseCapture
LoadImageA
DialogBoxParamW
TrackPopupMenu
GetWindowPlacement
IsDialogMessageA
DefDlgProcW
GetDesktopWindow
CharUpperBuffA
ScrollWindowEx
DlgDirSelectComboBoxExA
CloseWindow
GetMenuItemInfoW
DdeUninitialize
FindWindowA
wvsprintfA
SendIMEMessageExA
advapi32
RegOpenKeyExA
shell32
SHEmptyRecycleBinA
ShellExecuteW
SHGetFolderPathA
DragQueryFile
DragQueryFileA
SHLoadNonloadedIconOverlayIdentifiers
ExtractAssociatedIconA
SHBrowseForFolderA
ExtractIconExA
SHGetSpecialFolderPathW
SHGetDiskFreeSpaceA
SHCreateDirectoryExW
FindExecutableA
SHCreateDirectoryExA
SHGetIconOverlayIndexW
SHCreateProcessAsUserW
SHPathPrepareForWriteA
SHInvokePrinterCommandW
SHBrowseForFolderW
SHGetDesktopFolder
SHBrowseForFolder
SHGetPathFromIDListW
SHGetSettings
SHGetFolderPathW
SHGetDiskFreeSpaceExW
SHAppBarMessage
SHGetDataFromIDListW
ShellExecuteExW
ExtractIconW
SHPathPrepareForWriteW
DuplicateIcon
SHGetPathFromIDListA
DragFinish
shlwapi
StrStrIW
StrRChrA
StrStrW
Sections
.text Size: 289KB - Virtual size: 289KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text3 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text2 Size: 1024B - Virtual size: 968B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ