Static task
static1
Behavioral task
behavioral1
Sample
f63603cd6e7a7a1a9480d0bafc179628_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f63603cd6e7a7a1a9480d0bafc179628_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f63603cd6e7a7a1a9480d0bafc179628_JaffaCakes118
-
Size
1.5MB
-
MD5
f63603cd6e7a7a1a9480d0bafc179628
-
SHA1
bbb6b5ed9d9fbd9e5398fffafd33c6efc3943e59
-
SHA256
87538284853991f6fbbcff2b0a9a7e3dfc1d50f3b6f47bf59817ea706c256447
-
SHA512
161c025320c826d0ffd1339a1594c9ebcbfd5d8195f816f1fd440ec3ec989fb5e6c5ba2a3b5cf2622e8ad494d7b8feaa7d2ba4da4f05c0ca18fe0475b808b96f
-
SSDEEP
24576:7L9HhdHqCsKxyBoReqrS+voKQ6Ec1lKqlva/SUI1uqBSwQ7/GScFftMwHS:tHzQ0MAi6EcvK7I1xYwQCScFftMwy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f63603cd6e7a7a1a9480d0bafc179628_JaffaCakes118
Files
-
f63603cd6e7a7a1a9480d0bafc179628_JaffaCakes118.exe windows:4 windows x86 arch:x86
2cb350d559b791f0cc9a795fca21b3ee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
HeapAlloc
HeapFree
RaiseException
HeapSize
GetCommandLineA
GetModuleHandleA
GetStartupInfoA
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
LCMapStringA
LCMapStringW
RtlUnwind
IsBadWritePtr
IsBadCodePtr
GetLocaleInfoA
GetLocaleInfoW
SetStdHandle
ReadFile
WriteFile
CloseHandle
SetFilePointer
CreateDirectoryA
lstrcpyA
lstrlenA
RemoveDirectoryA
WaitForSingleObject
CreateProcessA
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameA
CreateMutexA
GlobalAddAtomA
GetFileAttributesA
GetVersionExA
GlobalFlags
MulDiv
lstrcmpiA
LoadLibraryA
GetStringTypeW
GetLastError
GetTempPathA
GetStringTypeA
CreateFileA
GetTempFileNameA
DeleteFileA
GetProcAddress
FreeLibrary
FlushFileBuffers
GetCurrentProcess
GetProcessVersion
GetCurrentThreadId
lstrcatA
TlsGetValue
GlobalGetAtomNameA
GetVersion
EnterCriticalSection
LocalReAlloc
TlsSetValue
GlobalLock
GlobalAlloc
GlobalReAlloc
GlobalHandle
LeaveCriticalSection
DeleteCriticalSection
GlobalUnlock
GlobalFree
LocalFree
TlsAlloc
InitializeCriticalSection
lstrcpynA
LocalAlloc
lstrcmpA
SetLastError
IsBadReadPtr
SetUnhandledExceptionFilter
user32
GetActiveWindow
DestroyMenu
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
GetClassNameA
PtInRect
ClientToScreen
GetDesktopWindow
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
PostQuitMessage
FindWindowA
InvalidateRect
SetRectEmpty
LoadAcceleratorsA
TranslateAcceleratorA
ReleaseCapture
LoadMenuA
SetMenu
ReuseDDElParam
UnpackDDElParam
IsIconic
BringWindowToTop
LoadCursorA
GetSystemMetrics
LoadIconA
PostMessageA
SystemParametersInfoA
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
GetFocus
SetActiveWindow
IsWindow
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetClientRect
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
IsWindowVisible
ScreenToClient
ReleaseDC
SetScrollInfo
ShowScrollBar
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetMenu
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetWindow
GetWindowRect
RegisterWindowMessageA
GetParent
SetFocus
IsWindowEnabled
ShowWindow
SetWindowPos
SetWindowLongA
GetDlgCtrlID
GetWindowTextA
SetWindowTextA
GetWindowLongA
GetDlgItem
EnableWindow
SetCursor
ShowOwnedPopups
SendMessageA
LoadStringA
UnhookWindowsHookEx
CreateDialogParamA
DestroyWindow
UpdateWindow
MessageBoxA
DialogBoxParamA
GetDlgItemTextA
EndDialog
wsprintfA
GetDC
ScrollWindow
GetSysColorBrush
CallNextHookEx
SetWindowsHookExA
GetKeyState
gdi32
SetTextColor
GetDeviceCaps
GetObjectA
DeleteDC
RestoreDC
SelectObject
SaveDC
GetStockObject
SetViewportOrgEx
OffsetViewportOrgEx
SetMapMode
ScaleViewportExtEx
SetViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SetBkColor
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CreateBitmap
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
DragFinish
DragQueryFileA
comctl32
ord17
ImageList_Destroy
Sections
.text Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ