Static task
static1
Behavioral task
behavioral1
Sample
fc0cfca2abf11d1eb4bf24893542ee42_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc0cfca2abf11d1eb4bf24893542ee42_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fc0cfca2abf11d1eb4bf24893542ee42_JaffaCakes118
-
Size
391KB
-
MD5
fc0cfca2abf11d1eb4bf24893542ee42
-
SHA1
1dacd4494342136715f14d3495888a7b150a070c
-
SHA256
d6a8c18e12a46b8fc92f811334d6ed5a386ce8bc2ec3fd36754d5f068ead3d3a
-
SHA512
18720645c9c4c28c6fde7858acc78d165206af73c2bea02f52765d0b60c0f7c0eb27a95e643b2ad7162c1b48c8677bcd6352efe80636a181c564755d31b73af3
-
SSDEEP
6144:BT5VKvS/Gn8QJKFzEaCu9OgkFtOlfpV7HmcqmlaGe5kFtOlfp0GSHXH4vY:fVKvSun8QJKFQtaNucrlaGaz2H4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fc0cfca2abf11d1eb4bf24893542ee42_JaffaCakes118
Files
-
fc0cfca2abf11d1eb4bf24893542ee42_JaffaCakes118.exe windows:5 windows x86 arch:x86
22ab4c08669c33caec1726a6f456a4f4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowsHookExW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
ValidateRect
GetCursorPos
PeekMessageW
GetKeyState
IsWindowVisible
GetActiveWindow
DispatchMessageW
LoadBitmapW
GetFocus
GetParent
GetScrollRange
SetScrollPos
GetScrollPos
UpdateWindow
GetMenu
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SetWindowLongW
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
RegisterWindowMessageW
RegisterClipboardFormatW
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
SetCursor
GetCapture
CallNextHookEx
GetMessageW
TranslateMessage
MessageBoxW
GetDesktopWindow
GetSystemMetrics
RemoveMenu
GetSystemMenu
IsIconic
GetClientRect
LoadIconW
GetAsyncKeyState
ExitWindowsEx
CloseClipboard
GetClipboardData
OpenClipboard
IsClipboardFormatAvailable
EnableMenuItem
GetWindowRect
GetForegroundWindow
SetFocus
SetWindowPos
SetForegroundWindow
AttachThreadInput
GetWindowThreadProcessId
SetWindowTextW
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
PostQuitMessage
UnhookWindowsHookEx
CheckMenuItem
ModifyMenuW
comdlg32
GetFileTitleW
ole32
CoTaskMemAlloc
CoUninitialize
OleUninitialize
OleInitialize
CoTaskMemFree
CoInitialize
gdi32
ExtTextOutW
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
Ellipse
CreateFontIndirectA
GetTextExtentPoint32A
GetMapMode
GetTextColor
GetBkColor
GetRgnBox
CreateRectRgnIndirect
CreateSolidBrush
GetStockObject
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutW
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
MoveToEx
LineTo
SetMapMode
EnumFontFamiliesExA
RestoreDC
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
kernel32
GlobalFindAtomW
GetModuleHandleA
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
MoveFileW
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetFullPathNameW
FileTimeToSystemTime
lstrlenA
GetFileTime
HeapFree
HeapAlloc
ConvertDefaultLocale
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapReAlloc
CompareStringW
GetFileType
ExitProcess
ExitThread
CreateThread
VirtualProtect
VirtualQuery
HeapSize
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCPInfo
GetOEMCP
Sleep
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LoadLibraryA
GetVersionExA
RaiseException
WritePrivateProfileStringW
GetCurrentProcessId
GlobalAddAtomW
GetProcAddress
InterlockedIncrement
InterlockedDecrement
GetSystemTimeAsFileTime
GetModuleHandleW
GetCurrentThreadId
GetCurrentProcess
HeapValidate
LeaveCriticalSection
FatalAppExitA
DeleteCriticalSection
EnterCriticalSection
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStdHandle
GetTickCount
DebugBreak
OutputDebugStringW
LoadLibraryExW
LoadLibraryExA
InitializeCriticalSection
RtlUnwind
GetSystemInfo
SetFilePointer
GetConsoleOutputCP
SetStdHandle
GetLastError
GetLocaleInfoA
GetTimeFormatA
GetDateFormatA
IsValidCodePage
VirtualAlloc
GetProcessHeap
GetCurrentDirectoryA
SetEnvironmentVariableW
ReleaseSemaphore
CreateSemaphoreA
GetShortPathNameW
CloseHandle
GetFileSizeEx
CreateFileW
CopyFileW
FlushFileBuffers
WriteFile
GetSystemTime
WaitForSingleObject
CreateMutexW
WideCharToMultiByte
GetACP
MultiByteToWideChar
lstrlenW
GetDiskFreeSpaceExW
GetDriveTypeW
GetFileAttributesW
DeleteFileW
SetCurrentDirectoryW
GetVolumeInformationW
lstrcpyW
GetCurrentDirectoryW
GetTempPathW
ReadFile
GetFileSize
GetDriveTypeA
GetLogicalDriveStringsA
FindClose
FindNextFileW
FindFirstFileW
FreeLibrary
LockResource
LoadResource
FindResourceExW
LoadLibraryW
GetModuleFileNameW
ReleaseMutex
SetLastError
GetUserDefaultLangID
CompareStringA
GetLocaleInfoW
lstrcmpA
EnumResourceLanguagesW
CreateMutexA
GetStringTypeExA
GetLogicalDrives
QueryPerformanceFrequency
CreateEventA
PulseEvent
OutputDebugStringA
GetFullPathNameA
LockFileEx
GetTempPathA
GetFileAttributesA
DeleteFileA
SetEnvironmentVariableA
CreateFileA
WriteConsoleW
WriteConsoleA
GetStringTypeW
GetStringTypeA
Sections
.text Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 238KB - Virtual size: 238KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ