Static task
static1
Behavioral task
behavioral1
Sample
02b1087e463de3ef0336af9de0c9b37e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02b1087e463de3ef0336af9de0c9b37e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
02b1087e463de3ef0336af9de0c9b37e_JaffaCakes118
-
Size
244KB
-
MD5
02b1087e463de3ef0336af9de0c9b37e
-
SHA1
796cf95d452ac25e3409758937f74e1c332beda1
-
SHA256
dddc86eec8bedee52320b2568619341c2d602180fa19e776fc496475e1047ec7
-
SHA512
3e70ba2c2a0114660355dba621934b28cce43c36cd074573a2cbf2bd26bc6bea2894a6792a90a1fde689fcc256dd28b5ddacbba9706fbc630387ad733698c88b
-
SSDEEP
3072:dC0WLmIlaxns2dCgFYj3halGwb56Z7W7dYi0wNhHkkstv+3:dUKQaNBCf3haoi5KW6nwNhEkq+3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02b1087e463de3ef0336af9de0c9b37e_JaffaCakes118
Files
-
02b1087e463de3ef0336af9de0c9b37e_JaffaCakes118.exe windows:4 windows x86 arch:x86
ce934b6bd4cd4b2d178f688ad1c1db16
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GetLocaleInfoA
GetCPInfo
GetOEMCP
RtlUnwind
VirtualAlloc
HeapAlloc
HeapFree
HeapReAlloc
ExitProcess
GetSystemTimeAsFileTime
RaiseException
GetCommandLineA
GetProcessHeap
GetStartupInfoA
HeapSize
TerminateProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GlobalFlags
lstrcmpA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
GetModuleHandleA
InterlockedDecrement
InterlockedIncrement
GlobalGetAtomNameA
GetCurrentProcess
GetThreadLocale
FlushFileBuffers
SetFilePointer
DeleteFileA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
lstrcpyA
LoadResource
LockResource
SizeofResource
FindResourceA
CreateToolhelp32Snapshot
Process32First
CloseHandle
Process32Next
GetVersionExA
SetLastError
GetComputerNameA
OpenMutexA
GetFileSize
ReadFile
CreateFileA
WriteFile
Sleep
GetCurrentThread
WaitForSingleObject
CopyFileA
GetTickCount
GetModuleFileNameA
GetTempPathA
LoadLibraryW
GetLastError
lstrlenA
WideCharToMultiByte
CompareStringA
CompareStringW
MultiByteToWideChar
InterlockedExchange
GetVersion
FreeLibrary
LoadLibraryA
UnhandledExceptionFilter
GetProcAddress
user32
PostQuitMessage
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowPos
SetWindowLongA
IsWindow
EnumWindows
GetDlgItem
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
RegisterWindowMessageA
SendMessageTimeoutA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetSystemMetrics
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
LoadCursorA
UnhookWindowsHookEx
MessageBoxA
GetKeyState
PeekMessageA
ValidateRect
UnregisterClassA
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
GetWindowTextA
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
gdi32
GetStockObject
ScaleViewportExtEx
CreateBitmap
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
GetDeviceCaps
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCloseKey
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 172KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ