Static task
static1
Behavioral task
behavioral1
Sample
fb0f8c44e79ae89e2ba4229f83c9aec9_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
fb0f8c44e79ae89e2ba4229f83c9aec9_JaffaCakes118
-
Size
184KB
-
MD5
fb0f8c44e79ae89e2ba4229f83c9aec9
-
SHA1
92d218f6469a34264b007171c9e1113e66d64d3d
-
SHA256
d083f2cf0962a5e3714fee3032c62b0eedcc90328e2339f31baea5daeeac78a2
-
SHA512
3df0e216b625a3c7b4dcf64c2a12ffdcb98f2ec782e5e519c0ebda3952e642e210677c7d9769259300c7b80b2a4b1a68e9ac78d23d785c19f601e91f6b2829b1
-
SSDEEP
3072:RwKeBWEkuCo7wK1JLwVRzvc84af2Z6heUpYfwHKDQYx:RReXzLol4mjheUYwP6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb0f8c44e79ae89e2ba4229f83c9aec9_JaffaCakes118
Files
-
fb0f8c44e79ae89e2ba4229f83c9aec9_JaffaCakes118.exe windows:4 windows x86 arch:x86
6aeb99af2a69e6665d2399043c61aadf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
LocalFree
lstrcpynA
LocalAlloc
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalAlloc
LocalReAlloc
CloseHandle
lstrcpyA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
lstrcatA
FreeLibrary
lstrcmpA
GlobalFlags
SetFilePointer
FlushFileBuffers
RaiseException
InterlockedIncrement
InterlockedDecrement
LoadLibraryA
GetProcAddress
IsBadWritePtr
HeapReAlloc
VirtualAlloc
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
HeapAlloc
WriteFile
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetLastError
TlsGetValue
SetLastError
SetStdHandle
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetOEMCP
GetACP
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
HeapSize
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
Sleep
GetProcessVersion
GetVersionExA
user32
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
CopyRect
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
GetParent
GetLastActivePopup
PostMessageA
GetClassNameA
GetWindow
GetDesktopWindow
GetWindowLongA
FindWindowExA
IsWindowEnabled
SendMessageA
MessageBoxA
EnableWindow
UnhookWindowsHookEx
GetMenuItemCount
LoadStringA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
comctl32
ord17
gdi32
DeleteObject
GetDeviceCaps
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetObjectA
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
Sections
.text Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE