Static task
static1
Behavioral task
behavioral1
Sample
04c4e7a81edd90f0444735662aeed47e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
04c4e7a81edd90f0444735662aeed47e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
04c4e7a81edd90f0444735662aeed47e_JaffaCakes118
-
Size
136KB
-
MD5
04c4e7a81edd90f0444735662aeed47e
-
SHA1
1afdae9cc776d1770e51462ef38068eb1a42cdc0
-
SHA256
a8487e27b1a09ab9c6a9eef65184c27f560d7626e32d18d54c774031fac019c9
-
SHA512
fe62fe2cbc776b40cf3a692bc0a2e4425f2f8e0d8852510ee9f0b7e50054134691f4e26880f6d58ae1de6ae9a522ac6c58905c60bca306a792db7752162f28cc
-
SSDEEP
3072:fX0bEezkG37bPa9ze6F0Cm2ePlhGgJ+oSQsg/:fvgnPaNFNm/Pft/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04c4e7a81edd90f0444735662aeed47e_JaffaCakes118
Files
-
04c4e7a81edd90f0444735662aeed47e_JaffaCakes118.exe windows:4 windows x86 arch:x86
dbf75e260a881560c9a66a693f9b618c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
ReadFile
EnterCriticalSection
CreateFileA
LoadLibraryA
WriteFile
lstrcpynA
GetModuleHandleA
GetProcAddress
GetVersionExA
InterlockedIncrement
GetSystemDefaultLangID
lstrcpyA
lstrcatA
lstrlenA
MoveFileExA
DeleteFileA
FindClose
FindFirstFileA
FindNextFileA
FormatMessageA
GetPrivateProfileIntA
WritePrivateProfileStringA
RemoveDirectoryA
LocalFree
GetTempPathA
DebugBreak
Sleep
OutputDebugStringA
FreeLibrary
GetSystemDirectoryA
ExitProcess
GetShortPathNameA
GetComputerNameA
CreateThread
DeleteCriticalSection
MoveFileA
InitializeCriticalSection
ReleaseMutex
HeapDestroy
SetThreadLocale
CreateMutexA
GetLastError
GetCurrentProcess
FlushInstructionCache
LeaveCriticalSection
GetCurrentThreadId
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
TerminateProcess
GetStringTypeW
GetStringTypeA
LCMapStringW
InterlockedDecrement
MultiByteToWideChar
WideCharToMultiByte
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetOEMCP
GetACP
GetCPInfo
VirtualAlloc
VirtualFree
HeapCreate
GetVersion
GetCommandLineA
GetStartupInfoA
GetLocalTime
GetSystemTime
GetTimeZoneInformation
HeapAlloc
HeapReAlloc
CompareStringW
SetEnvironmentVariableA
CompareStringA
LCMapStringA
HeapFree
user32
DrawFrameControl
GetWindowTextA
DrawTextA
IsRectEmpty
CopyRect
GetClientRect
SetWindowRgn
LoadImageA
GetWindowDC
ScreenToClient
SetRectEmpty
UnhookWindowsHookEx
GetCursorPos
SetTimer
ShowWindow
EndPaint
BeginPaint
InflateRect
GetDC
PtInRect
SetCapture
ReleaseCapture
SetWindowsHookExA
MoveWindow
PostMessageA
KillTimer
CallNextHookEx
UpdateWindow
DefWindowProcA
IsWindow
OffsetRect
SystemParametersInfoA
GetWindowRect
GetSystemMetrics
LoadStringA
SetWindowLongA
GetWindowLongA
CallWindowProcA
CreateWindowExA
RegisterClassExA
wsprintfA
LoadCursorA
GetClassInfoExA
CreateDialogParamA
IsDialogMessageA
DestroyWindow
MessageBoxA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
FindWindowA
SendMessageTimeoutA
CharNextA
wvsprintfA
SetDlgItemTextA
EnableWindow
GetSysColor
SetWindowTextA
GetDlgItemTextA
GetWindow
MapWindowPoints
SetWindowPos
GetDlgItem
GetParent
SetPropA
GetCapture
SendMessageA
InvalidateRect
ClientToScreen
SetCursor
GetPropA
RemovePropA
DrawIconEx
ReleaseDC
PostQuitMessage
IsDlgButtonChecked
CheckDlgButton
gdi32
GetClipBox
GetObjectA
GetStockObject
CreateFontIndirectA
StretchBlt
SetStretchBltMode
DeleteDC
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
SetBkMode
ExtTextOutA
SetTextColor
BitBlt
FrameRgn
SetBkColor
CreateSolidBrush
ExcludeClipRect
OffsetRgn
CombineRgn
CreateRectRgn
EqualRgn
CreatePolygonRgn
SetWindowOrgEx
CreateRoundRectRgn
GetViewportOrgEx
SetPixelV
SetViewportOrgEx
OffsetWindowOrgEx
SetViewportExtEx
Polygon
SetMapMode
SetWindowExtEx
DeleteObject
advapi32
RegEnumKeyExA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegEnumValueA
RegQueryInfoKeyA
RegQueryValueExA
FreeSid
shell32
ShellExecuteA
ole32
OleInitialize
OleUninitialize
CoInitialize
CoUninitialize
oleaut32
OleTranslateColor
shlwapi
SHSetValueA
SHGetValueA
SHDeleteKeyA
comctl32
ImageList_GetIconSize
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
ImageList_Draw
ImageList_SetBkColor
InitCommonControlsEx
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ