Static task
static1
Behavioral task
behavioral1
Sample
017df3e1fbf3077b4ecc3505f978fc29_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
017df3e1fbf3077b4ecc3505f978fc29_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
017df3e1fbf3077b4ecc3505f978fc29_JaffaCakes118
-
Size
116KB
-
MD5
017df3e1fbf3077b4ecc3505f978fc29
-
SHA1
00a273aaa0354b8240225d6d754cb90d087e3a28
-
SHA256
d40c6e1a46ec1bf164b884997375f0ba3d0e19032995b6b0f7871435157547aa
-
SHA512
2f8749281fdd965be405a20909a5c8f85cb2b3b1b8feaa6db1c6bf47284ca82a4d55e074c253d889446160f021683fe0786a34f7714dd57e0c5abc378c015ce4
-
SSDEEP
1536:LA1rTrb0ZanRg/XdcUkUTKXSSeqJFaoVLGX1Gw4AfZksczp2038:LAd3gcnStcZU2RnJozdpu3zpM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 017df3e1fbf3077b4ecc3505f978fc29_JaffaCakes118
Files
-
017df3e1fbf3077b4ecc3505f978fc29_JaffaCakes118.exe windows:4 windows x86 arch:x86
b8bd07638c8f508d13211136e4077abd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetClassLongA
DispatchMessageA
GetClientRect
SetWindowLongW
SetTimer
DispatchMessageW
ClientToScreen
IsDialogMessageW
GetIconInfo
CharLowerA
GetMessagePos
GetKeyNameTextA
SetFocus
GetMenuItemID
SetMenu
DefFrameProcA
GetSystemMenu
GetForegroundWindow
SendMessageW
FrameRect
KillTimer
SetCapture
DestroyIcon
PtInRect
RegisterWindowMessageA
SetWindowPlacement
SetActiveWindow
GetSystemMetrics
SetWindowPos
SetMenuItemInfoA
GetClassLongA
DeleteMenu
DefMDIChildProcA
GetMenuItemCount
GetWindow
CharToOemA
SetClipboardData
SetPropA
ScreenToClient
LoadCursorA
SetCursor
IsZoomed
LoadStringA
GetDlgItem
InvalidateRect
CharUpperBuffA
GetSubMenu
DrawEdge
GetWindowLongA
GetDC
GetMenu
MessageBeep
GetPropA
DrawAnimatedRects
EnableWindow
CreateMenu
EnableMenuItem
GetCapture
GetDesktopWindow
RemovePropA
InsertMenuItemA
MessageBoxA
IntersectRect
LoadKeyboardLayoutA
ReleaseCapture
EndPaint
IsRectEmpty
GetKeyboardLayout
GetWindowTextA
MsgWaitForMultipleObjects
GetWindowDC
WaitMessage
IsDialogMessageA
MapWindowPoints
GetParent
DrawTextA
SetParent
DestroyWindow
SystemParametersInfoA
GetKeyboardType
CheckMenuItem
CharNextW
TranslateMessage
SetWindowLongA
GetSysColor
FindWindowA
GetScrollPos
DefWindowProcA
GetClassNameA
GetWindowPlacement
GetScrollInfo
DrawIcon
IsWindowEnabled
MapVirtualKeyA
RegisterClassA
ScrollWindow
CreatePopupMenu
ActivateKeyboardLayout
GetMenuItemInfoA
IsWindowUnicode
WindowFromPoint
SetScrollInfo
BeginPaint
ShowScrollBar
CallNextHookEx
LoadIconA
PeekMessageA
AdjustWindowRectEx
EnumWindows
UpdateWindow
EnumChildWindows
DestroyCursor
CloseClipboard
GetMenuStringA
DestroyMenu
GetCursor
TrackPopupMenu
GetClipboardData
GetScrollRange
SetRect
EmptyClipboard
PeekMessageW
SendMessageA
ChildWindowFromPoint
FillRect
GetMenuState
GetSysColorBrush
SetScrollRange
MoveWindow
GetWindowRect
OpenClipboard
OemToCharA
IsWindowVisible
RedrawWindow
LoadBitmapA
GetFocus
DrawIconEx
CreateIcon
GetWindowLongW
SetWindowsHookExA
RemoveMenu
RegisterClipboardFormatA
UnregisterClassA
EnableScrollBar
GetKeyboardLayoutList
ShowWindow
DrawFrameControl
GetWindowThreadProcessId
CharNextA
GetClassInfoA
CreateWindowExA
GetLastActivePopup
SetWindowTextA
GetKeyboardLayoutNameA
IsIconic
GetKeyboardState
GetKeyState
TranslateMDISysAccel
SetScrollPos
UnhookWindowsHookEx
ReleaseDC
ShowOwnedPopups
GetActiveWindow
EqualRect
OffsetRect
PostQuitMessage
PostMessageA
GetCursorPos
IsChild
CharLowerBuffA
InsertMenuA
InflateRect
SetForegroundWindow
DrawMenuBar
CallWindowProcA
GetDCEx
IsWindow
wsprintfA
GetTopWindow
shell32
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHFileOperationA
kernel32
GetThreadLocale
HeapAlloc
GetProcAddress
GetSystemDefaultLangID
ExitThread
GetCPInfo
SizeofResource
GlobalAddAtomA
ExitProcess
SetEndOfFile
Sleep
GetStringTypeW
GetUserDefaultLCID
FindResourceA
ResetEvent
GetCurrentProcess
LoadLibraryExA
GetStartupInfoA
WriteFile
GetCurrentProcessId
GetTickCount
CreateThread
GetOEMCP
FormatMessageA
LocalReAlloc
DeleteCriticalSection
GlobalFindAtomA
GetLastError
HeapFree
DeleteFileA
CloseHandle
HeapDestroy
GetCommandLineA
CreateEventA
EnterCriticalSection
SetFilePointer
GetModuleFileNameA
lstrlenA
FindFirstFileA
lstrcpynA
RaiseException
GetVersionExA
GlobalDeleteAtom
GetFileSize
GetCurrentThreadId
LoadLibraryA
GetStringTypeA
CreateFileA
SetErrorMode
GetFileType
GetEnvironmentStrings
VirtualAlloc
MoveFileA
GetModuleHandleA
MoveFileExA
EnumCalendarInfoA
InitializeCriticalSection
WideCharToMultiByte
GetCurrentThread
VirtualFree
GetFileAttributesA
GetFullPathNameA
lstrcatA
FindClose
LockResource
VirtualQuery
FreeResource
CompareStringA
SetEvent
WaitForSingleObject
FreeLibrary
LoadResource
LocalFree
GetDateFormatA
lstrcpyA
LocalAlloc
GetVersion
GetStdHandle
GetDiskFreeSpaceA
SetLastError
ReadFile
VirtualAllocEx
GetACP
GetLocalTime
GlobalAlloc
lstrcmpA
SetThreadLocale
lstrcmpiA
GetProcessHeap
comdlg32
GetFileTitleA
msvcrt
malloc
log
calloc
memcpy
memmove
Sections
.text Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ