Static task
static1
Behavioral task
behavioral1
Sample
08fb498103f6498189dcaf4eb337147d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
08fb498103f6498189dcaf4eb337147d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
08fb498103f6498189dcaf4eb337147d_JaffaCakes118
-
Size
114KB
-
MD5
08fb498103f6498189dcaf4eb337147d
-
SHA1
42caeed0ad9c66ce081ea733a3b1ecf720e7e7f0
-
SHA256
f0fe34176bef64f28b0b6d5244a91891e819aca894e9e695dc527af1eeaea2d0
-
SHA512
9c77412948465c7f9235b0c1019aa89fea42d9d03352f9981628d553c7b1d57cfc06ab1f2521cb7ca72c1ffb94c3b1a323db884fa6c304d64fe43a61d744d877
-
SSDEEP
1536:9a8bHvFg6frxQStfr/kd47PkF3WSEx+aCitR9AfqNWNcY:QePxTGStfLkd4DkF3vEx+GtbnUcY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08fb498103f6498189dcaf4eb337147d_JaffaCakes118
Files
-
08fb498103f6498189dcaf4eb337147d_JaffaCakes118.exe windows:4 windows x86 arch:x86
a4aa1fd55734578f7897c3e0a5cfb17a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_DrawEx
gdi32
SetTextColor
GetPixel
SetBkColor
CreatePenIndirect
CreateBrushIndirect
GetObjectA
msvcrt
memcpy
wcscspn
memset
strlen
sprintf
memmove
strcmp
pow
kernel32
LoadLibraryExA
ExitProcess
SetErrorMode
GlobalDeleteAtom
VirtualAllocEx
GetModuleHandleA
GlobalAddAtomA
FreeLibrary
FindResourceA
LoadLibraryA
shell32
SHGetDesktopFolder
SHGetFolderPathA
advapi32
RegCreateKeyA
RegQueryInfoKeyA
user32
IsWindowVisible
SetForegroundWindow
ShowOwnedPopups
GetWindowLongA
OpenClipboard
GetClassInfoA
ScrollWindow
AdjustWindowRectEx
GetWindowRect
SetScrollInfo
GetScrollPos
DrawMenuBar
EqualRect
UpdateWindow
ScreenToClient
CharToOemA
EndPaint
TranslateMDISysAccel
EnumThreadWindows
IntersectRect
SetWindowTextA
ReleaseCapture
SetMenuItemInfoA
GetScrollRange
GetDCEx
EnableWindow
GetLastActivePopup
CharUpperBuffA
WindowFromPoint
DefWindowProcA
CreatePopupMenu
CreateIcon
UnhookWindowsHookEx
FillRect
EnumWindows
FindWindowA
IsDialogMessageA
GetDesktopWindow
RegisterWindowMessageA
GetMessagePos
DispatchMessageA
MessageBeep
ChildWindowFromPoint
SystemParametersInfoA
GetFocus
CallNextHookEx
DestroyMenu
SetPropA
SetScrollRange
GetKeyboardLayoutNameA
GetForegroundWindow
BeginPaint
MessageBoxA
GetWindowLongW
GetWindow
GetWindowTextA
DrawAnimatedRects
IsWindowEnabled
ActivateKeyboardLayout
GetKeyboardLayout
CheckMenuItem
SetWindowLongW
GetKeyboardType
GetSystemMenu
InvalidateRect
SetMenu
DeleteMenu
CharNextA
CallWindowProcA
GetDlgItem
DrawIconEx
GetMenu
SetWindowLongA
DefFrameProcA
LoadStringA
DrawTextA
PostMessageA
DrawIcon
IsChild
GetMenuState
EnableScrollBar
SetClipboardData
DrawEdge
GetMenuItemInfoA
GetSystemMetrics
LoadKeyboardLayoutA
TrackPopupMenu
SendMessageA
SetScrollPos
GetSysColor
GetActiveWindow
GetMenuItemCount
IsWindowUnicode
GetMenuItemID
DestroyIcon
FrameRect
ReleaseDC
ShowScrollBar
SetParent
IsDialogMessageW
GetDC
PostQuitMessage
SetCapture
DestroyCursor
KillTimer
PeekMessageA
GetPropA
GetKeyNameTextA
DispatchMessageW
CharNextW
GetCursor
EnableMenuItem
GetWindowPlacement
GetParent
InflateRect
InsertMenuItemA
LoadIconA
MapWindowPoints
CharLowerA
GetClientRect
SetTimer
DefMDIChildProcA
UnregisterClassA
CharLowerBuffA
GetKeyboardLayoutList
GetScrollInfo
IsIconic
GetKeyState
GetWindowDC
MoveWindow
GetSysColorBrush
GetClassLongA
wsprintfA
DrawFrameControl
IsZoomed
GetIconInfo
WaitMessage
EmptyClipboard
SetFocus
RedrawWindow
GetClassNameA
RemoveMenu
SetWindowPlacement
GetMenuStringA
SetWindowsHookExA
TranslateMessage
SendMessageW
EnumChildWindows
DestroyWindow
GetCapture
RemovePropA
InsertMenuA
GetKeyboardState
GetSubMenu
IsWindow
PeekMessageW
CloseClipboard
PtInRect
MapVirtualKeyA
shlwapi
PathIsDirectoryA
SHGetValueA
SHEnumValueA
SHDeleteKeyA
PathIsContentTypeA
PathGetCharTypeA
comdlg32
GetOpenFileNameA
GetFileTitleA
GetSaveFileNameA
version
GetFileVersionInfoSizeA
VerFindFileA
VerQueryValueA
Sections
CODE Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 399B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ