Static task
static1
Behavioral task
behavioral1
Sample
fc2f6c809cee90fecbeaf7f4d87014fd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc2f6c809cee90fecbeaf7f4d87014fd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fc2f6c809cee90fecbeaf7f4d87014fd_JaffaCakes118
-
Size
132KB
-
MD5
fc2f6c809cee90fecbeaf7f4d87014fd
-
SHA1
a4863efff9a78d08daa1aa3bbc7b2daa4ed4d11f
-
SHA256
1781482886fe79d624b89689b88d20815f2ad6ded9d511c91c79b0684ed698a7
-
SHA512
53eb582c3b772b8ac2bba05164881d2cbb7944bccde74317790d6b8cce6eb84b4f1ddbb72bb05377aa17b2ab4c6df4d3bfb6f3c8708dd1997d953bce9cc2afb6
-
SSDEEP
3072:vUq50RXpH/mI7CW5Z92o0bdFiQ6Gfh4oY56Uu:vUHeI7CWAFdt+u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fc2f6c809cee90fecbeaf7f4d87014fd_JaffaCakes118
Files
-
fc2f6c809cee90fecbeaf7f4d87014fd_JaffaCakes118.exe windows:4 windows x86 arch:x86
30615628918008685736d69c0fd66964
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
GetFileSize
GetFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
ExitProcess
HeapFree
RaiseException
HeapAlloc
HeapReAlloc
HeapSize
GetACP
SetStdHandle
GetFileType
GetTimeZoneInformation
GetFullPathNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
FindFirstFileA
FindClose
GetProcAddress
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
GlobalHandle
GlobalUnlock
GlobalFree
TlsAlloc
WaitForSingleObject
SetLastError
GetModuleFileNameA
lstrcatA
SetErrorMode
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LoadLibraryA
LocalAlloc
FreeLibrary
lstrcpyA
lstrcpynA
EnterCriticalSection
GetLastError
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
InterlockedExchange
GetCurrentThreadId
FormatMessageA
LocalFree
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetModuleHandleA
Sleep
CreateDirectoryA
CreateToolhelp32Snapshot
Process32First
CloseHandle
OpenProcess
Process32Next
GetExitCodeProcess
TerminateProcess
user32
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
LoadIconA
ShowWindow
LoadCursorA
GetSysColorBrush
DestroyMenu
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
GetWindowPlacement
GetSystemMetrics
CharUpperA
GrayStringA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
wsprintfA
UnhookWindowsHookEx
GetLastActivePopup
IsWindowEnabled
MessageBoxA
EnableWindow
GetWindowTextA
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetWindowLongA
GetClassNameA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetParent
GetNextDlgTabItem
SetCursor
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
SendMessageA
IsWindow
GetDlgItem
DefWindowProcA
DestroyWindow
GetCursorPos
SetWindowsHookExA
LoadStringA
PostMessageA
PostQuitMessage
FindWindowA
IsIconic
CreateWindowExA
DrawTextA
gdi32
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
SetBkColor
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateBitmap
DeleteObject
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
comctl32
ord17
urlmon
URLDownloadToFileA
wininet
InternetGetLastResponseInfoA
DeleteUrlCacheEntry
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetReadFile
InternetQueryDataAvailable
Sections
.text Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ