Static task
static1
Behavioral task
behavioral1
Sample
05c004ebe85bb0479aee2bc09dd9ae70_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
05c004ebe85bb0479aee2bc09dd9ae70_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
05c004ebe85bb0479aee2bc09dd9ae70_JaffaCakes118
-
Size
459KB
-
MD5
05c004ebe85bb0479aee2bc09dd9ae70
-
SHA1
a9d453bc1806bf4697fd849f4c9da4a1e5c604f5
-
SHA256
dcb17d557cfff0ec033bec5732abbf3bd099c30880a9e3a98adb2c66343b4465
-
SHA512
cd5933425c1991d96ec1fbfab4552846689098033ee5cfd73751fe7d812efff508fa73eea41e82ed0c2256437d0033d29dff1707c0425fb55b27ba9b514f6a05
-
SSDEEP
6144:3KghR6DjX+89paA4P+pG/GIRPut7WiO7K0EiaNXcBJ/nzpzSC3Wbx2i+y6:3zYDZ9paAm+pEGyut78kd+zB3WbQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 05c004ebe85bb0479aee2bc09dd9ae70_JaffaCakes118
Files
-
05c004ebe85bb0479aee2bc09dd9ae70_JaffaCakes118.exe windows:4 windows x86 arch:x86
24f58416fb5e7cd28f3fdc72c61c5b33
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
tppwrw32
ord154
ord172
ord158
ord106
ord104
ord126
ord124
ord174
ord116
ord170
ord156
_SM_UpdateCalcCounter@4
ord420
ord8
ord128
ord118
ord168
ord166
ord164
ord162
ord160
ord152
kernel32
GetVolumeInformationA
FindFirstFileA
FindClose
GetFullPathNameA
SetErrorMode
GetModuleHandleA
GetCommandLineA
RaiseException
HeapAlloc
HeapFree
ExitProcess
TerminateProcess
CreateThread
ExitThread
HeapReAlloc
HeapSize
GetCPInfo
FlushFileBuffers
RtlUnwind
GlobalAlloc
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStdHandle
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
VirtualAlloc
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
GetLocaleInfoA
GetLocaleInfoW
lstrcpyA
CreateMutexA
GetVersionExA
SetFilePointer
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameA
GetProfileStringA
GlobalAddAtomA
WriteFile
WritePrivateProfileStringA
TlsGetValue
GetVersion
GetProcessVersion
GlobalReAlloc
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
SizeofResource
LocalFree
LocalAlloc
GlobalFlags
GetLastError
SetLastError
WideCharToMultiByte
lstrcmpiA
MultiByteToWideChar
SuspendThread
MulDiv
CreateEventA
SetEvent
SetThreadPriority
ResumeThread
UnhandledExceptionFilter
GlobalDeleteAtom
lstrcatA
lstrcmpA
GetCurrentThread
GetCurrentThreadId
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
LoadLibraryA
GetProcAddress
FreeLibrary
GetDiskFreeSpaceA
GetDriveTypeA
GetCurrentProcess
CreateProcessA
CloseHandle
lstrlenA
OpenFile
_lread
_lclose
lstrcpynA
Sleep
WaitForSingleObject
ReleaseMutex
GetStartupInfoA
InterlockedExchange
FreeEnvironmentStringsA
GetEnvironmentStrings
GetACP
GetOEMCP
FreeEnvironmentStringsW
user32
SendDlgItemMessageA
UpdateWindow
CheckDlgButton
SystemParametersInfoA
IsDlgButtonChecked
IsDialogMessageA
SetWindowTextA
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
GetMenuCheckMarkDimensions
TranslateMessage
GetMessageA
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
GrayStringA
CharUpperA
DestroyMenu
IntersectRect
InflateRect
GetClassNameA
PtInRect
GetSysColorBrush
GetTopWindow
GetCapture
GetClassInfoA
RegisterClassA
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetMenu
TrackPopupMenu
SetWindowPlacement
GetWindowPlacement
GetWindowTextLengthA
DispatchMessageA
MapWindowPoints
GetKeyState
DefWindowProcA
SetWindowsHookExA
SetPropA
CallNextHookEx
UnhookWindowsHookEx
GetLastActivePopup
GetForegroundWindow
GetPropA
RemovePropA
CallWindowProcA
GetMessageTime
GetMessagePos
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
GetNextDlgTabItem
IsWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
PostQuitMessage
ExitWindowsEx
SetCapture
LoadCursorA
SetCursor
ShowCursor
ReleaseCapture
DrawIcon
wsprintfA
ValidateRect
DrawTextA
ScreenToClient
LoadBitmapA
OffsetRect
GetClientRect
ChildWindowFromPoint
MessageBeep
KillTimer
CreatePopupMenu
GetCursorPos
PostMessageA
GetSystemMenu
AppendMenuA
WinHelpA
SetDlgItemTextA
EndDialog
DialogBoxParamA
PostThreadMessageA
FindWindowA
GetActiveWindow
GetDC
IsIconic
ReleaseDC
SendMessageA
SetForegroundWindow
GetWindowRect
SetTimer
GetSysColor
MessageBoxA
PeekMessageA
GetFocus
SetFocus
AdjustWindowRectEx
CopyRect
IsWindowVisible
GetDlgCtrlID
GetWindowTextA
CreateWindowExA
LoadStringA
LoadIconA
ShowWindow
SetActiveWindow
InvalidateRect
EnableWindow
CheckRadioButton
DestroyWindow
CreateDialogIndirectParamA
ClientToScreen
GetSystemMetrics
DefDlgProcA
DrawFocusRect
CharNextA
WindowFromPoint
IsWindowUnicode
HideCaret
UnregisterClassA
ExcludeUpdateRgn
ShowCaret
gdi32
LineTo
CreateSolidBrush
SelectObject
MoveToEx
CreateFontIndirectA
GetStockObject
SetBkColor
SaveDC
RestoreDC
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
IntersectClipRect
GetObjectA
CreateCompatibleDC
StretchBlt
GetDeviceCaps
PtVisible
RectVisible
ExtTextOutA
Escape
TextOutA
PatBlt
GetTextExtentPointA
DeleteObject
DeleteDC
BitBlt
Rectangle
CreateBitmap
SetTextColor
CreatePen
CreateDIBitmap
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegDeleteValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegOpenKeyExA
RegOpenKeyA
RegCloseKey
RegCreateKeyExA
shell32
Shell_NotifyIconA
comctl32
ImageList_Destroy
ord17
Sections
.text Size: 133KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.T� Size: 230KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE