Static task
static1
Behavioral task
behavioral1
Sample
07d2987eefb2a38eb2bdfe3f1af46a17_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07d2987eefb2a38eb2bdfe3f1af46a17_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
07d2987eefb2a38eb2bdfe3f1af46a17_JaffaCakes118
-
Size
292KB
-
MD5
07d2987eefb2a38eb2bdfe3f1af46a17
-
SHA1
956c1d46f358856e285637ae30e71154b9d6e64b
-
SHA256
b25e306244bc645a4012c89fae1ea84ebc8e1906d13aed942addcc453bc19508
-
SHA512
5b3810ef4cd63fc26850c9bd942b1b42c6ded4e9f6289cd917d495bfdb5cbe251297a04459edfb3df9105fa4e6116f3ea638d3af916fc6010b3f34e24cbf1cd5
-
SSDEEP
6144:RgByKIGi12vBPSxgtuHp1fhyeQ3oRPhhjuf:RJGiABkgsjfhy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07d2987eefb2a38eb2bdfe3f1af46a17_JaffaCakes118
Files
-
07d2987eefb2a38eb2bdfe3f1af46a17_JaffaCakes118.exe windows:4 windows x86 arch:x86
99f2e24620b0c5e8385e2cf60798c124
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
LocalReAlloc
GlobalFlags
TlsGetValue
TlsSetValue
GetOEMCP
SetErrorMode
RtlUnwind
GetCommandLineA
WritePrivateProfileStringA
GetProcessVersion
GetSystemTime
GetLocalTime
GetCPInfo
ExitProcess
SetEnvironmentVariableA
TerminateProcess
HeapFree
HeapAlloc
GetACP
HeapReAlloc
HeapSize
GetDriveTypeA
GetTimeZoneInformation
FreeEnvironmentStringsW
RaiseException
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
HeapDestroy
HeapCreate
GetFileType
TlsFree
SetStdHandle
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
lstrlenA
FindFirstFileA
FindNextFileA
FindClose
MultiByteToWideChar
GetCurrentProcess
GetStartupInfoA
CreateProcessA
GetSystemDirectoryA
GetLastError
GetCurrentDirectoryA
GetTempPathA
CreateDirectoryA
DeleteFileA
LoadLibraryA
CopyFileA
DosDateTimeToFileTime
GlobalReAlloc
LeaveCriticalSection
TlsAlloc
GlobalHandle
DeleteCriticalSection
FileTimeToLocalFileTime
InitializeCriticalSection
LocalAlloc
FileTimeToSystemTime
SetFileTime
GetFullPathNameA
SetEndOfFile
lstrcpynA
MoveFileA
FlushFileBuffers
MulDiv
WriteFile
GlobalGetAtomNameA
GetVersion
lstrcatA
GlobalAddAtomA
GlobalFindAtomA
FindResourceA
LocalFree
LockResource
InterlockedDecrement
LoadResource
WideCharToMultiByte
InterlockedIncrement
lstrcpyA
lstrcmpA
GlobalDeleteAtom
GetCurrentThreadId
lstrcmpiA
GetCurrentThread
GlobalFree
GlobalAlloc
GetModuleHandleA
GlobalLock
GlobalUnlock
GetVersionExA
GetWindowsDirectoryA
SetFilePointer
SetCurrentDirectoryA
SetLastError
GetFileAttributesA
ReadFile
MoveFileExA
SetFileAttributesA
GetModuleFileNameA
FreeLibrary
GetProcAddress
RemoveDirectoryA
CreateFileA
CloseHandle
VirtualFree
GetShortPathNameA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
user32
SetDlgItemTextA
IsDialogMessageA
SetWindowTextA
LoadStringA
ClientToScreen
BeginPaint
EndPaint
ShowWindow
DrawTextA
GrayStringA
TabbedTextOutA
GetClassNameA
PtInRect
GetSysColorBrush
LoadCursorA
DestroyMenu
GetSysColor
SetFocus
AdjustWindowRectEx
CopyRect
GetTopWindow
GetCapture
WinHelpA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
EndDialog
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SetCursor
PostQuitMessage
PostMessageA
MessageBoxExA
GetClassInfoA
wsprintfA
SendDlgItemMessageA
GetDC
ReleaseDC
PeekMessageA
TranslateMessage
DispatchMessageA
EnableWindow
KillTimer
SetTimer
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
LoadIconA
UpdateWindow
MessageBoxA
MapWindowPoints
GetWindowTextA
GetDlgCtrlID
IsWindow
SetActiveWindow
UnregisterClassA
gdi32
GetDeviceCaps
GetClipBox
CreateBitmap
SetBkColor
DeleteDC
SetTextColor
SaveDC
RestoreDC
GetStockObject
SelectObject
SetMapMode
SetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
OffsetViewportOrgEx
SetWindowExtEx
ScaleWindowExtEx
DeleteObject
PtVisible
TextOutA
ExtTextOutA
RectVisible
Escape
GetObjectA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
GetUserNameA
shell32
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
comctl32
ord17
Sections
.text Size: 168KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
XOR Size: 4096.0MB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE