Static task
static1
Behavioral task
behavioral1
Sample
04ce6dc7c28b27d275485ae6e9715058_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
04ce6dc7c28b27d275485ae6e9715058_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
04ce6dc7c28b27d275485ae6e9715058_JaffaCakes118
-
Size
252KB
-
MD5
04ce6dc7c28b27d275485ae6e9715058
-
SHA1
94c31890186986de2b3211817f61d8e3645e04ae
-
SHA256
e4480ccfb105f20799d1a439e1186c1dfac0455a1b9a626f93e00c40b73ce8a4
-
SHA512
917d728e42a3f5ddd3b2fdf98e500f98422d6e8e9ea325a612a9584d7139e67b4b5c268ca68c5e4438cf1acef4e32c0687a0dcce51c45326546871e793e634a0
-
SSDEEP
3072:Y3U7/OVjnvjARmIhbPg7fmTiwZpXKr83Hq9WrhhhsnepC9hw/GTXItxMWYy+xTv5:zWNnvqmWjg7u7p643K9ghPsWYX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04ce6dc7c28b27d275485ae6e9715058_JaffaCakes118
Files
-
04ce6dc7c28b27d275485ae6e9715058_JaffaCakes118.exe windows:4 windows x86 arch:x86
4c8865cc167b390fddfc4d08a392db47
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PtInRect
GetTopWindow
DrawIcon
SetActiveWindow
SetRect
PeekMessageW
IsRectEmpty
DeleteMenu
SetParent
PeekMessageA
InvalidateRect
MessageBoxA
DrawEdge
ShowScrollBar
GetScrollPos
SendMessageA
IsChild
GetWindowLongW
DestroyCursor
KillTimer
SetWindowPos
EnableMenuItem
TranslateMessage
LoadStringA
GetKeyboardLayoutNameA
SendMessageW
GetClassNameA
EqualRect
CallNextHookEx
MapWindowPoints
GetScrollInfo
ShowWindow
DrawFrameControl
MsgWaitForMultipleObjects
GetCursor
UnregisterClassA
SetClipboardData
GetKeyboardType
SetCapture
DrawTextA
RegisterClassA
EnableWindow
InsertMenuItemA
EndPaint
WindowFromPoint
InflateRect
SetWindowsHookExA
MoveWindow
GetMenuItemInfoA
GetKeyState
GetSystemMetrics
GetCursorPos
BeginPaint
OemToCharA
SetScrollRange
PostQuitMessage
GetClassInfoA
RegisterClipboardFormatA
CreateMenu
MessageBeep
GetPropA
GetForegroundWindow
GetWindowThreadProcessId
GetSystemMenu
SetForegroundWindow
CharLowerA
ScrollWindow
GetMessagePos
GetMenuState
IsDialogMessageA
GetSysColor
GetClipboardData
GetActiveWindow
EnumChildWindows
GetClassLongA
IsIconic
GetIconInfo
GetKeyboardState
GetWindowTextA
GetDesktopWindow
GetWindow
ScreenToClient
SystemParametersInfoA
GetCapture
EnableScrollBar
CallWindowProcA
PostMessageA
CreateIcon
LoadIconA
GetWindowPlacement
OffsetRect
SetWindowLongW
OpenClipboard
SetWindowLongA
CharToOemA
CharUpperBuffA
wsprintfA
EnumWindows
SetMenuItemInfoA
GetKeyNameTextA
EmptyClipboard
RedrawWindow
IsWindowVisible
RemovePropA
TrackPopupMenu
IntersectRect
DefFrameProcA
GetKeyboardLayoutList
CharNextA
IsWindow
ShowOwnedPopups
FillRect
CreateWindowExA
SetFocus
GetMenuStringA
SetWindowTextA
SetPropA
GetMenuItemID
RegisterWindowMessageA
GetSysColorBrush
DrawAnimatedRects
GetParent
DispatchMessageA
SetWindowPlacement
LoadCursorA
SetScrollPos
DispatchMessageW
GetLastActivePopup
IsDialogMessageW
DestroyIcon
ClientToScreen
FrameRect
AdjustWindowRectEx
SetClassLongA
GetDC
IsZoomed
SetCursor
LoadBitmapA
TranslateMDISysAccel
UnhookWindowsHookEx
GetScrollRange
GetFocus
DestroyMenu
WaitMessage
IsWindowUnicode
GetDCEx
GetMenuItemCount
IsWindowEnabled
GetWindowLongA
ChildWindowFromPoint
GetSubMenu
DrawIconEx
InsertMenuA
GetClientRect
EnumThreadWindows
CloseClipboard
SetTimer
ReleaseCapture
DefWindowProcA
CharLowerBuffA
GetMenu
CheckMenuItem
MapVirtualKeyA
RemoveMenu
ReleaseDC
GetKeyboardLayout
DestroyWindow
CharNextW
SetMenu
GetWindowDC
GetDlgItem
GetWindowRect
comctl32
ImageList_GetBkColor
ImageList_DrawEx
ImageList_Add
ImageList_Write
ImageList_Read
kernel32
GlobalAlloc
ExitProcess
LocalReAlloc
lstrlenA
VirtualAllocEx
LoadLibraryA
lstrcmpiA
GetModuleHandleA
FindFirstFileA
GetVersionExA
GetDateFormatA
lstrcmpA
GetCPInfo
GetACP
LoadResource
MoveFileExA
GetModuleFileNameA
GetProcAddress
lstrcatA
InitializeCriticalSection
MoveFileA
SetHandleCount
ExitThread
EnumCalendarInfoA
EnterCriticalSection
GetCommandLineA
IsBadReadPtr
VirtualAlloc
GetStringTypeW
SetThreadLocale
DeleteFileA
GetCommandLineW
advapi32
RegOpenKeyExA
RegQueryValueA
gdi32
SetPixel
GetPixel
GetDIBColorTable
SelectPalette
GetRgnBox
GetBitmapBits
GetPaletteEntries
SelectObject
Sections
CODE Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 161KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc3 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc0 Size: 512B - Virtual size: 231B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc6 Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc4 Size: 512B - Virtual size: 70B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc2 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ