Static task
static1
Behavioral task
behavioral1
Sample
0ab2cb4f3813f0a898a645ef2daca2aa_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0ab2cb4f3813f0a898a645ef2daca2aa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0ab2cb4f3813f0a898a645ef2daca2aa_JaffaCakes118
-
Size
145KB
-
MD5
0ab2cb4f3813f0a898a645ef2daca2aa
-
SHA1
9c16aa3268b14d95d9b6f3eae4a590cec780e811
-
SHA256
0c2bd71b5d898c89e8f51fb3433b8d1e722ded39721143410054e43a5b4f3f45
-
SHA512
9723995763289d7921de8ad9bf78168a340d2be3407c061fe991b0ba9586c24eaa80e2c9f09c49036265a27be2c2e3de75d5c2cef6133a3f9b9efb15df143664
-
SSDEEP
3072:EFSFOgrfe3jC7aXVEoNRF158MdzyNts1eWtKRlmdtWQBZJ1oFbwiHoHUz:EFSFZe3jAaX39auXKmtj9QX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ab2cb4f3813f0a898a645ef2daca2aa_JaffaCakes118
Files
-
0ab2cb4f3813f0a898a645ef2daca2aa_JaffaCakes118.exe windows:4 windows x86 arch:x86
66d983d11df79d76295d520264eb0eda
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAlloc
lstrlenA
lstrcmpA
GlobalLock
GlobalSize
GetProcAddress
GetCurrentThreadId
FormatMessageA
WideCharToMultiByte
MultiByteToWideChar
GlobalDeleteAtom
GlobalAddAtomA
SetErrorMode
GetFileAttributesA
GlobalGetAtomNameW
GetTickCount
CreateProcessA
Sleep
CreateEventA
GetVersionExA
FreeLibrary
MulDiv
RtlZeroMemory
GetLocaleInfoA
RtlMoveMemory
LocalReAlloc
GetPrivateProfileStringA
WaitForSingleObject
ExitThread
lstrcmpiA
GetProfileStringA
SetEvent
GetProfileIntA
CreateThread
CloseHandle
GetWindowsDirectoryA
LoadLibraryA
ExitProcess
lstrcpynA
SearchPathA
GetDriveTypeA
lstrcatA
GlobalUnlock
GlobalFree
LocalFree
LocalAlloc
GetStdHandle
GetOEMCP
GetACP
GetModuleFileNameA
UnhandledExceptionFilter
RtlUnwind
GetLastError
VirtualAlloc
VirtualFree
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetVersion
GetCommandLineA
GetEnvironmentStrings
GetStartupInfoA
GetModuleHandleA
GetFileType
TlsSetValue
TlsAlloc
TlsGetValue
lstrcpyA
GetCPInfo
user32
SystemParametersInfoA
DispatchMessageA
SetForegroundWindow
SetRectEmpty
SetMenu
CharLowerBuffA
InsertMenuA
DeleteMenu
GetWindowPlacement
DestroyMenu
CreateMenu
RemoveMenu
GetMenuItemCount
GetDesktopWindow
CheckMenuItem
EqualRect
FrameRect
DrawIcon
DrawTextA
UnhookWindowsHook
TranslateMessage
TranslateAcceleratorA
GetMessageA
SetWindowsHookA
IsWindowEnabled
RedrawWindow
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
LoadImageA
IsZoomed
GetMenuState
PostQuitMessage
DestroyIcon
RegisterClipboardFormatA
GetClassNameA
ShowCursor
GetAsyncKeyState
GetKeyState
GetWindowThreadProcessId
UpdateWindow
MsgWaitForMultipleObjects
FindWindowA
IsWindow
DestroyWindow
CreateWindowExA
OffsetRect
MapWindowPoints
GetDlgItemTextA
SetDlgItemTextA
SendDlgItemMessageA
CheckDlgButton
EnableWindow
GetDlgCtrlID
WinHelpA
LoadStringA
SetWindowTextA
EndDialog
GetFocus
IsDlgButtonChecked
GetDlgItem
SetFocus
CheckRadioButton
SetDlgItemInt
GetDlgItemInt
MessageBeep
DialogBoxParamA
GetWindowTextA
SetWindowLongA
CallWindowProcA
PostMessageA
wsprintfA
LoadCursorA
RegisterClassA
DefWindowProcA
BeginPaint
GetClientRect
GetSysColor
FillRect
EndPaint
SetCapture
GetParent
GetWindowRect
CopyRect
ReleaseCapture
KillTimer
GetDC
ScreenToClient
InvertRect
LoadMenuA
LoadIconA
LoadAcceleratorsA
CopyAcceleratorTableA
InflateRect
GetWindow
MoveWindow
InvalidateRect
IsCharAlphaA
IsCharAlphaNumericA
GetDialogBaseUnits
IntersectRect
CharPrevA
wvsprintfA
ClientToScreen
ReleaseDC
ValidateRect
GetWindowLongA
SendMessageA
SetTimer
GetMessagePos
PtInRect
MessageBoxA
GetMenu
EnableMenuItem
IsWindowVisible
GetActiveWindow
IsRectEmpty
GetSystemMetrics
SetRect
AdjustWindowRect
ShowWindow
BringWindowToTop
SetActiveWindow
IsIconic
SetCursor
SetParent
SetWindowPos
ModifyMenuA
DrawMenuBar
GetSubMenu
PeekMessageA
gdi32
Polygon
SetWindowExtEx
SetWindowOrgEx
SetViewportExtEx
SetViewportOrgEx
SetMapMode
SetTextColor
SelectObject
GetStockObject
DeleteObject
CreateSolidBrush
CreatePatternBrush
CreateBitmap
GetTextExtentPoint32A
GetDeviceCaps
GetObjectA
SelectPalette
CreateFontIndirectA
SetROP2
SetBkMode
Rectangle
GetBkMode
GetROP2
CreatePen
DeleteDC
StretchBlt
CreateCompatibleDC
TextOutA
PatBlt
CreateCompatibleBitmap
RestoreDC
ExcludeClipRect
SaveDC
CreatePalette
GetPaletteEntries
DeleteMetaFile
CloseMetaFile
StretchDIBits
SetStretchBltMode
RealizePalette
CreateMetaFileA
MoveToEx
LineTo
GetSystemPaletteEntries
GetSystemPaletteUse
SetBkColor
GetDIBits
comctl32
ord17
ord6
CreateToolbarEx
shell32
ShellAboutA
ExtractIconA
DragQueryFileA
DragFinish
SHGetFileInfo
DragAcceptFiles
winmm
OpenDriver
CloseDriver
mciSendStringA
mciSendCommandA
sndPlaySoundA
mciGetErrorStringA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
Sections
.text Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 22KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ