Static task
static1
Behavioral task
behavioral1
Sample
02a1429778421b1372565aa7bc18978e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
02a1429778421b1372565aa7bc18978e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
02a1429778421b1372565aa7bc18978e_JaffaCakes118
-
Size
768KB
-
MD5
02a1429778421b1372565aa7bc18978e
-
SHA1
071f6cb377b0cffc2a9df1e657be84de21c475ae
-
SHA256
fc86e6c3116c12027f51643a93e365ccf317346b12dcc2be86b49013257b64fb
-
SHA512
140457bb2f60dc5962378d44ca831e36731e3acd04787c26a0eb553cc48baae1965b6ee7cbf0068ba30d78e5e30ce2c709ec09e0909535ae414b1e3b3029d712
-
SSDEEP
12288:tbGR0R2PyxtDMZVICDzLoY+4OhYoTSj9dbvHhRqLH8ixHhPuQB:tbiBPyxtDMZVt3LoYGI7hcLcSu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02a1429778421b1372565aa7bc18978e_JaffaCakes118
Files
-
02a1429778421b1372565aa7bc18978e_JaffaCakes118.exe windows:4 windows x86 arch:x86
6381ccfecfc1bfe87f2f5ddc53ff523d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetFileInfoA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
SHGetMalloc
SHBrowseForFolderA
SHGetDesktopFolder
ShellExecuteExA
DragFinish
ord155
SHFileOperationA
Shell_NotifyIconA
DragQueryFileA
ExtractIconA
gdi32
CreateCompatibleBitmap
GetNearestColor
CreateDCA
GetTextCharacterExtra
AbortDoc
IntersectClipRect
Rectangle
Arc
StretchDIBits
GetRegionData
CreateFontIndirectA
CreatePatternBrush
SetWindowOrgEx
ExtCreatePen
PatBlt
GetRgnBox
ExtTextOutA
TextOutA
Polyline
Pie
SetPixelV
FloodFill
GetViewportExtEx
FillPath
BitBlt
DeleteMetaFile
SetBkColor
comctl32
ImageList_Replace
_TrackMouseEvent
CreatePropertySheetPageA
ImageList_GetIcon
ImageList_Add
ImageList_GetImageCount
DestroyPropertySheetPage
ImageList_Create
ImageList_DragShowNolock
ImageList_Draw
ImageList_GetIconSize
ImageList_Destroy
ord17
ImageList_LoadImageA
InitCommonControlsEx
ImageList_AddMasked
ImageList_GetImageInfo
kernel32
LCMapStringA
InitializeCriticalSection
IsDebuggerPresent
GetCommandLineW
GetStringTypeA
GlobalDeleteAtom
GetCommandLineA
lstrlenW
GetLocaleInfoA
SetFilePointer
FindClose
LeaveCriticalSection
lstrlenA
GetLocaleInfoW
HeapCreate
GlobalHandle
InterlockedIncrement
TlsSetValue
SetStdHandle
GetSystemTimeAsFileTime
FlushFileBuffers
EnterCriticalSection
HeapReAlloc
GetConsoleMode
GetModuleHandleW
LCMapStringW
TerminateProcess
GetACP
GetConsoleOutputCP
SetEvent
GetEnvironmentStringsW
TlsFree
InterlockedExchange
GetUserDefaultLCID
GetProcAddress
OutputDebugStringW
GetCurrentThreadId
DeleteFileW
CreateFileA
WriteFile
SetEndOfFile
WriteConsoleW
TlsGetValue
GetConsoleCP
GetProcessHeap
GetStdHandle
InterlockedCompareExchange
GetModuleFileNameA
SetLastError
InterlockedDecrement
GetStringTypeW
GetCPInfo
GetFileType
HeapFree
GlobalLock
RaiseException
IsValidCodePage
IsValidLocale
HeapDestroy
CreateMutexW
MultiByteToWideChar
FileTimeToLocalFileTime
CloseHandle
GetLocalTime
GetFileSize
GetVersionExA
SetHandleCount
GetOEMCP
HeapAlloc
FatalAppExitA
FreeEnvironmentStringsW
GetCurrentProcess
ExitProcess
GetEnvironmentStrings
RtlUnwind
TlsAlloc
FreeResource
SetUnhandledExceptionFilter
VirtualFree
FreeEnvironmentStringsA
Sleep
GetModuleFileNameW
GetCurrentThread
GetTickCount
CompareStringW
VirtualAlloc
lstrcmpiW
FreeLibrary
GetStartupInfoW
GetModuleHandleA
WriteConsoleA
UnhandledExceptionFilter
WaitForSingleObject
GetTimeZoneInformation
QueryPerformanceCounter
SetConsoleCtrlHandler
SetEnvironmentVariableA
LocalAlloc
WideCharToMultiByte
GetTimeFormatA
GetStartupInfoA
GlobalFree
LoadLibraryA
GetDateFormatA
HeapSize
DeleteCriticalSection
CompareStringA
GetCurrentProcessId
GetLastError
GetVersion
VirtualQuery
ReadFile
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
advapi32
RegSetValueW
RegDeleteValueW
RegQueryValueExW
user32
GetClientRect
PostQuitMessage
DefWindowProcW
EnableMenuItem
EndDialog
IsDlgButtonChecked
GetSystemMetrics
RegisterWindowMessageW
GetWindowThreadProcessId
GetMenuItemCount
GetScrollPos
LoadMenuW
GetMessagePos
BeginPaint
SendDlgItemMessageW
GetWindowRect
GetDlgCtrlID
EndPaint
GetWindowDC
EnumWindows
RegisterClassW
GetSubMenu
GetCursorPos
DrawMenuBar
SetFocus
GetDlgItem
SetMenuItemBitmaps
ReuseDDElParam
KillTimer
GetWindowLongW
UnregisterClassA
SetTimer
TranslateAcceleratorW
ReleaseDC
GetPropW
IsWindow
DrawIconEx
InvalidateRect
IsIconic
CreatePopupMenu
GetTopWindow
UnhookWindowsHookEx
FillRect
RemovePropW
CopyRect
DestroyIcon
SetMenuItemInfoW
MessageBoxW
GetCapture
RedrawWindow
DrawTextW
DestroyWindow
OffsetRect
GetForegroundWindow
PtInRect
TrackPopupMenuEx
InflateRect
SystemParametersInfoW
SetCursor
GetActiveWindow
GetClassInfoW
SetParent
PostMessageW
SetMenuDefaultItem
SetPropW
RegisterClassExW
GetWindowTextLengthW
SetCapture
GetDesktopWindow
CreateDialogIndirectParamW
TrackPopupMenu
MapWindowPoints
SetActiveWindow
GetWindowRgn
ShowWindow
ClientToScreen
SetDlgItemInt
CreateWindowExW
GetScrollInfo
TranslateMessage
SetClipboardData
GetSysColorBrush
GetClassLongW
UnregisterClassW
GetClassNameW
CheckMenuItem
MessageBeep
LoadCursorW
DrawTextExW
ole32
OleLoad
CreateGenericComposite
CoGetClassObject
CreateStreamOnHGlobal
ReadClassStg
OleCreateMenuDescriptor
CoTaskMemFree
StringFromGUID2
OleInitialize
WriteFmtUserTypeStg
OleDestroyMenuDescriptor
CoDisconnectObject
CreateBindCtx
ReadFmtUserTypeStg
OleUninitialize
CoRegisterClassObject
SetConvertStg
StgOpenStorageOnILockBytes
CoTaskMemAlloc
OleRun
StringFromCLSID
OleIsCurrentClipboard
OleTranslateAccelerator
CoLockObjectExternal
CreateFileMoniker
OleRegEnumVerbs
CoTreatAsClass
CLSIDFromString
WriteClassStm
OleIsRunning
DoDragDrop
IsAccelerator
OleSetClipboard
CreateOleAdviseHolder
CoRegisterMessageFilter
StgCreateDocfile
OleGetClipboard
OleRegGetMiscStatus
OleDuplicateData
Sections
.text Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 460KB - Virtual size: 459KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ