Static task
static1
Behavioral task
behavioral1
Sample
0ca0e500a14da5d4478de57c5c505985_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0ca0e500a14da5d4478de57c5c505985_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0ca0e500a14da5d4478de57c5c505985_JaffaCakes118
-
Size
288KB
-
MD5
0ca0e500a14da5d4478de57c5c505985
-
SHA1
8c378b93f6c6e1d9594b23882e77097cd07685cf
-
SHA256
b79b84eb3e79c9bb024e8babde0da793c04315b3552ee0dbbc62ae07cf034ec5
-
SHA512
ee89a62ac4cd98f86858298a0e7d71cecc960220408571cca27c1c809fac19c5a1cfa5cba0fe741844bb85d2130bfb28f2fae6e66116e4955e4e78a81d9d9da5
-
SSDEEP
6144:B+wRnl57XzNdoplM+1QAiT4WHHL2AvodpBCHE/vnWcwoWE47X:fRl5PLo9By4KLBkHWciEw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ca0e500a14da5d4478de57c5c505985_JaffaCakes118
Files
-
0ca0e500a14da5d4478de57c5c505985_JaffaCakes118.exe windows:4 windows x86 arch:x86
ceedf46a2be25891d37d44a9060509bf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetFolderPathA
SHGetSpecialFolderPathA
shlwapi
PathGetArgsA
PathAppendA
SHGetValueA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFileExistsA
PathIsDirectoryA
iphlpapi
GetAdaptersInfo
kernel32
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
WriteFile
GetStdHandle
SetStdHandle
SetHandleCount
ReadFile
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
InitializeCriticalSection
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeW
GetLocaleInfoA
SetEndOfFile
SetEnvironmentVariableA
LocalFree
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
FindClose
FindNextFileA
FindFirstFileA
LockFile
UnlockFile
GetFileSize
GetThreadLocale
DuplicateHandle
GetFullPathNameA
GlobalGetAtomNameA
LocalAlloc
GlobalReAlloc
GlobalHandle
LocalReAlloc
GetFileTime
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalFlags
GetCurrentDirectoryA
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetProcessHeap
GetCommandLineA
RaiseException
GetFileType
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
HeapReAlloc
HeapAlloc
GetModuleHandleA
VirtualAlloc
RtlUnwind
HeapFree
OutputDebugStringA
RemoveDirectoryA
Sleep
CreateMutexA
GetSystemTimeAsFileTime
SystemTimeToFileTime
ExitProcess
GetTempPathA
CopyFileA
SetCurrentDirectoryA
lstrcpyA
SetLastError
GetVolumeInformationA
GetComputerNameA
GetFileAttributesA
DeleteFileA
lstrcmpA
GetVersionExA
GetCurrentProcess
SetPriorityClass
GetModuleFileNameA
GetShortPathNameA
CreateFileA
DeviceIoControl
LoadResource
LockResource
SizeofResource
FindResourceA
GetLastError
lstrlenA
lstrcmpiA
WideCharToMultiByte
CompareStringA
CompareStringW
MultiByteToWideChar
GetVersion
InterlockedExchange
OpenProcess
WaitForSingleObject
TerminateProcess
CloseHandle
FreeLibrary
LoadLibraryA
GetProcAddress
GetStringTypeA
GetDriveTypeA
user32
SetWindowTextA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
PostQuitMessage
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
LoadCursorA
GetDC
DestroyMenu
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
SendMessageA
GetKeyState
PeekMessageA
ValidateRect
GetSystemMetrics
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ClientToScreen
GetMenu
UnregisterClassA
EnumWindows
PostMessageA
FindWindowExA
GetWindowThreadProcessId
CharUpperA
SendMessageTimeoutA
RegisterWindowMessageA
MessageBoxA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDesktopWindow
GetWindow
GetWindowTextA
FindWindowA
SetWindowPos
gdi32
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
RestoreDC
SaveDC
DeleteObject
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
SetViewportOrgEx
SelectObject
ExtTextOutA
GetDeviceCaps
TextOutA
RectVisible
PtVisible
SetMapMode
Escape
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
ole32
StringFromIID
CoGetMalloc
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ