Static task
static1
Behavioral task
behavioral1
Sample
0b8f96a6fba3b555394b81dd6fb0c1a9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b8f96a6fba3b555394b81dd6fb0c1a9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0b8f96a6fba3b555394b81dd6fb0c1a9_JaffaCakes118
-
Size
197KB
-
MD5
0b8f96a6fba3b555394b81dd6fb0c1a9
-
SHA1
3cff7f3e070375b009970e7e48f0c6d974022bfd
-
SHA256
55b958fb2faf7285eb36c6323ed02f7ca0686dffa2a0e201083d7b2c36aacb5c
-
SHA512
1d02181068a66e26c3c3d884ef146f486136e0264e71930db11e86f38d25cfafbe531c80a408c90655acf0993322d829b55644132538e046d1007607d4180f82
-
SSDEEP
6144:3Zw8+H+KLYACm3LwKBMxqFIdhImidgF/3m:pKYA13fiImb/m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b8f96a6fba3b555394b81dd6fb0c1a9_JaffaCakes118
Files
-
0b8f96a6fba3b555394b81dd6fb0c1a9_JaffaCakes118.exe windows:5 windows x86 arch:x86
b1d10ebe4a223f0193474adfc5aa9506
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42u
ord4050
ord3232
ord4215
ord2576
ord3649
ord2430
ord2858
ord1637
ord2854
ord2567
ord4390
ord3569
ord1764
ord6362
ord2405
ord2016
ord4214
ord2573
ord4395
ord3634
ord2403
ord2015
ord4213
ord2570
ord4392
ord3577
ord3870
ord5047
ord5949
ord3092
ord5677
ord2281
ord2362
ord6330
ord2520
ord2644
ord1662
ord3494
ord2507
ord355
ord4270
ord3621
ord2406
ord3568
ord3566
ord1634
ord3687
ord1633
ord5781
ord3716
ord795
ord755
ord640
ord5787
ord323
ord470
ord6153
ord6168
ord5869
ord283
ord2746
ord613
ord289
ord3605
ord6238
ord768
ord6024
ord4253
ord4970
ord5155
ord5156
ord5154
ord4899
ord4736
ord4942
ord4371
ord1771
ord5283
ord4829
ord6739
ord6481
ord6867
ord6279
ord6278
ord3871
ord5845
ord5846
ord4124
ord2809
ord4118
ord2855
ord6865
ord2933
ord6107
ord1775
ord4254
ord6594
ord6584
ord5284
ord4433
ord2046
ord4425
ord6525
ord6564
ord6484
ord4279
ord4709
ord4667
ord4269
ord4480
ord2546
ord5727
ord3917
ord1089
ord5193
ord2388
ord3341
ord5296
ord5298
ord4074
ord4692
ord5303
ord5285
ord5710
ord4616
ord3733
ord561
ord5496
ord6350
ord5712
ord5713
ord1131
ord1202
ord2717
ord815
ord1172
ord6748
ord2621
ord1791
ord614
ord1220
ord1199
ord4221
ord2478
ord3998
ord1203
ord2615
ord290
ord1594
ord446
ord743
ord3658
ord609
ord692
ord1808
ord616
ord537
ord922
ord858
ord940
ord942
ord861
ord2810
ord5977
ord538
ord6868
ord3087
ord540
ord4155
ord2634
ord2506
ord4370
ord1197
ord4704
ord1143
ord5264
ord1561
ord1569
ord268
ord1177
ord2139
ord3792
ord5714
ord6193
ord2385
ord5228
ord6191
ord6211
ord6195
ord2294
ord324
ord3592
ord4419
ord5276
ord1767
ord6048
ord4992
ord4847
ord5261
ord765
ord567
ord3693
ord4418
ord4621
ord4075
ord3074
ord3820
ord3826
ord3825
ord3397
ord2971
ord3076
ord2980
ord3257
ord3131
ord4459
ord3254
ord3142
ord2977
ord5273
ord2116
ord5257
ord1720
ord5059
ord3744
ord6372
ord2047
ord2640
ord4435
ord4831
ord3793
ord5286
ord4347
ord6370
ord5157
ord2377
ord5237
ord4401
ord1768
ord4073
ord6051
ord2371
ord2859
ord1165
ord1196
ord3865
ord2438
ord800
ord641
ord656
ord4229
ord1560
ord823
ord4848
ord825
msvcrt
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_fcvt
_wtol
_wmakepath
_wsplitpath
wcscpy
_wcmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
free
_wcsdup
wcsstr
__p__commode
_wcsicmp
atof
_ftol
floor
ceil
_CxxThrowException
wcsncpy
_wtoi
wcslen
_itow
__p__fmode
_vsnwprintf
__CxxFrameHandler
wcsrchr
wcscmp
??1type_info@@UAE@XZ
__dllonexit
_onexit
_controlfp
_except_handler3
__set_app_type
?terminate@@YAXXZ
wcschr
_beginthreadex
msvcp60
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@PBGABV?$allocator@G@1@@Z
?_C@?1??_Nullstr@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@CAPBGXZ@4GB
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@ABV01@@Z
advapi32
RegEnumValueW
RegOpenKeyW
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExA
RegQueryValueExA
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
RegQueryValueExW
RegCloseKey
kernel32
FreeResource
GetCurrentProcessId
WaitForSingleObject
ExitThread
WaitForSingleObjectEx
GetExitCodeThread
CloseHandle
GlobalUnlock
GlobalFree
GlobalLock
MultiByteToWideChar
lstrlenW
WideCharToMultiByte
LoadResource
FindResourceW
GetSystemPowerStatus
CreateEventW
SetEvent
TerminateThread
GetCurrentThreadId
Sleep
lstrlenA
GetLocaleInfoW
SetFileAttributesW
GetModuleHandleA
GetStartupInfoW
CopyFileW
CreateDirectoryW
GetModuleFileNameW
GetFileAttributesW
GetVersion
DeleteFileW
GetTempFileNameW
GetTempPathW
GetModuleHandleW
SetUnhandledExceptionFilter
GetSystemTime
SetCurrentDirectoryW
GetLastError
lstrcpynW
FreeLibrary
GetWindowsDirectoryW
LoadLibraryA
CreateFileW
GetSystemTimeAsFileTime
GetLocaleInfoA
GetUserDefaultLCID
GetVersionExA
SetLastError
OutputDebugStringA
LocalFree
FormatMessageA
GetCurrentProcess
RaiseException
QueryPerformanceCounter
GetTickCount
LocalAlloc
InterlockedExchange
GetProcAddress
LoadLibraryW
TerminateProcess
OpenProcess
LockResource
InterlockedIncrement
gdi32
GetTextExtentPoint32W
GetTextMetricsW
CreateFontIndirectW
SetBrushOrgEx
StretchDIBits
SelectObject
DeleteObject
DeleteDC
SetBkMode
SetTextColor
GetStockObject
CreateSolidBrush
CreateCompatibleBitmap
RealizePalette
CreateCompatibleDC
BitBlt
CreatePalette
GetDeviceCaps
user32
SetForegroundWindow
IsWindowVisible
GetParent
EnumThreadWindows
IsIconic
GetWindowRect
GetClientRect
SetTimer
KillTimer
FlashWindow
EnableWindow
SetActiveWindow
GetActiveWindow
IsWindowEnabled
GetDesktopWindow
EnumWindows
LoadStringW
LoadIconW
UnhookWindowsHookEx
SetWindowsHookExW
DestroyWindow
DispatchMessageW
TranslateMessage
PeekMessageW
PostThreadMessageW
DrawEdge
AppendMenuW
EnableMenuItem
GetSubMenu
LoadMenuW
GetWindowTextW
GetDC
ReleaseDC
InvalidateRect
DestroyIcon
DrawTextW
DrawIconEx
LoadImageW
FillRect
GetSysColor
LoadBitmapW
TrackPopupMenu
SystemParametersInfoW
SetWindowPos
FindWindowW
ShowScrollBar
HideCaret
ReplyMessage
InSendMessage
CreateWindowExW
PostQuitMessage
MessageBoxW
SendMessageTimeoutW
ShowWindow
GetWindowLongW
GetPropW
SetPropW
SetWindowLongW
GetWindowLongA
GetWindowThreadProcessId
MessageBoxA
CallNextHookEx
GetSystemMetrics
IsWindowUnicode
SendMessageW
PostMessageW
GetSystemMenu
RemovePropW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
shlwapi
PathAppendW
PathAddBackslashW
comctl32
ord17
shell32
SHGetMalloc
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetDiskFreeSpaceExW
SHGetFolderPathW
ole32
OleInitialize
OleUninitialize
PropVariantClear
CoInitialize
CoUninitialize
CoDisconnectObject
CoCreateInstance
StringFromGUID2
oleaut32
SysFreeString
VariantClear
VariantChangeType
VariantInit
SysAllocString
mspgimme
EPMsoLoadLibraryByName
EPLoadMSO
SetupGimme
EPMsoGimmeFile
msi
ord39
Sections
.text Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.scansrv Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ndata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE