Static task
static1
Behavioral task
behavioral1
Sample
082fc3fd937f7d1ffd259fa2cbcdc1ca_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
082fc3fd937f7d1ffd259fa2cbcdc1ca_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
082fc3fd937f7d1ffd259fa2cbcdc1ca_JaffaCakes118
-
Size
98KB
-
MD5
082fc3fd937f7d1ffd259fa2cbcdc1ca
-
SHA1
00902f15179ccff8ccd0d1c7355227353134fc7d
-
SHA256
2d85ddaf9caf4714f8df8a3dade656ce124fdeda4ecbb6f6441ce699565c75c0
-
SHA512
0cd9790992a25ffc7f7b851fb64758e7dd466362b168ed12cd53edd86aae7bd51162f9ac441bfaf8ae3bd39a28cb7585bebc97ea97c2579e9d8ba437fc739d5a
-
SSDEEP
1536:lsKZbKJC4AC9hKwx2PV5HE7itqVmFsmWjJ3kv1RCj7CMLFCALkvOrmw4m2OE:ecB4AC3QV5HE7AslsRCdhC9GrOzF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 082fc3fd937f7d1ffd259fa2cbcdc1ca_JaffaCakes118
Files
-
082fc3fd937f7d1ffd259fa2cbcdc1ca_JaffaCakes118.exe windows:4 windows x86 arch:x86
1132dbd421d5e0d3a9b4a125f2df376a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
MoveFileExA
LocalReAlloc
lstrcmpA
GetEnvironmentStrings
SizeofResource
LoadLibraryA
FreeLibrary
InitializeCriticalSection
GlobalAddAtomA
RaiseException
GetCurrentProcess
SetLastError
GetLocaleInfoA
GetFileSize
lstrcpyA
GetCommandLineA
GetThreadLocale
GetDiskFreeSpaceA
DeleteCriticalSection
CreateEventA
DeleteFileA
FindResourceA
GetTickCount
GetFileType
CloseHandle
GetVersionExA
EnterCriticalSection
FindClose
SetEndOfFile
LocalFree
FormatMessageA
CreateFileA
HeapAlloc
CompareStringA
WriteFile
GetStdHandle
SetErrorMode
LoadLibraryExA
lstrlenA
EnumCalendarInfoA
lstrcmpiA
GetStringTypeA
GetLastError
GetUserDefaultLCID
GlobalAlloc
GetSystemDefaultLangID
HeapDestroy
GetCurrentThread
LockResource
FreeResource
lstrcatA
GetModuleHandleA
GlobalDeleteAtom
GetProcessHeap
Sleep
ExitThread
GetModuleFileNameA
GetStartupInfoA
GlobalFindAtomA
GetLocalTime
MulDiv
LoadResource
GetCurrentProcessId
WideCharToMultiByte
GetOEMCP
SetThreadLocale
HeapFree
GetACP
SetEvent
VirtualAllocEx
GetCPInfo
GetFullPathNameA
ExitProcess
CreateThread
lstrcpynA
WaitForSingleObject
GetDateFormatA
VirtualQuery
ResetEvent
VirtualAlloc
GetStringTypeW
LocalAlloc
FindFirstFileA
VirtualFree
GetVersion
user32
GetKeyboardLayoutNameA
CharLowerA
DefWindowProcA
GetClientRect
GetMenuStringA
GetKeyState
KillTimer
CallWindowProcA
SetTimer
WindowFromPoint
ChildWindowFromPoint
ShowOwnedPopups
FillRect
EnableScrollBar
OpenClipboard
GetClassNameA
GetDCEx
ShowWindow
DestroyMenu
GetDC
GetDesktopWindow
RegisterWindowMessageA
CharNextW
MsgWaitForMultipleObjects
RegisterClassA
CreateIcon
EmptyClipboard
InsertMenuItemA
LoadKeyboardLayoutA
CloseClipboard
LoadCursorA
IsWindowEnabled
DefFrameProcA
EnableMenuItem
SetActiveWindow
DrawEdge
SetScrollRange
AdjustWindowRectEx
InflateRect
GetSysColorBrush
GetKeyNameTextA
GetTopWindow
GetDlgItem
SetRect
RemoveMenu
SetClassLongA
ReleaseCapture
GetScrollPos
GetPropA
IsZoomed
DrawIconEx
TrackPopupMenu
SetWindowTextA
GetLastActivePopup
PeekMessageA
MessageBeep
GetMessagePos
GetCapture
SetFocus
MessageBoxA
IsIconic
DrawFrameControl
RedrawWindow
RegisterClipboardFormatA
DefMDIChildProcA
GetMenuItemCount
LoadStringA
GetKeyboardLayoutList
EndPaint
DrawIcon
LoadIconA
IsRectEmpty
SetCapture
SetScrollPos
DestroyCursor
GetClassLongA
GetKeyboardType
SetWindowLongW
LoadBitmapA
GetMenuState
GetKeyboardLayout
PostMessageA
MapWindowPoints
FindWindowA
CharNextA
SetCursor
MoveWindow
GetWindow
GetCursorPos
SetWindowsHookExA
PeekMessageW
EnumThreadWindows
TranslateMDISysAccel
GetSubMenu
GetSystemMetrics
WaitMessage
IsChild
UnregisterClassA
GetWindowLongW
GetActiveWindow
IsWindowVisible
GetFocus
GetWindowPlacement
CallNextHookEx
EnableWindow
SetWindowLongA
IsWindow
ScreenToClient
DrawAnimatedRects
GetScrollRange
DispatchMessageA
GetMenuItemInfoA
EqualRect
DestroyWindow
IntersectRect
EnumWindows
IsDialogMessageW
SendMessageA
ShowScrollBar
SendMessageW
SetPropA
PostQuitMessage
GetWindowTextA
DrawTextA
CharToOemA
GetSystemMenu
DispatchMessageW
SetParent
SetForegroundWindow
CreateMenu
IsWindowUnicode
InvalidateRect
MapVirtualKeyA
CreateWindowExA
SetScrollInfo
GetWindowLongA
DestroyIcon
IsDialogMessageA
BeginPaint
SetWindowPos
GetMenu
ReleaseDC
GetWindowDC
OemToCharA
GetForegroundWindow
GetSysColor
GetWindowThreadProcessId
SetMenu
OffsetRect
CreatePopupMenu
ActivateKeyboardLayout
DeleteMenu
wsprintfA
ClientToScreen
GetMenuItemID
GetScrollInfo
SystemParametersInfoA
GetCursor
TranslateMessage
SetMenuItemInfoA
EnumChildWindows
GetWindowRect
PtInRect
GetKeyboardState
DrawMenuBar
FrameRect
CharUpperBuffA
CheckMenuItem
SetWindowPlacement
InsertMenuA
GetIconInfo
UnhookWindowsHookEx
RemovePropA
GetParent
msvcrt
sqrt
memcmp
memmove
memcpy
sin
wcschr
time
wcscspn
calloc
Sections
CODE Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 245B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ