Static task
static1
Behavioral task
behavioral1
Sample
0bfd8eca77a025bb5d35d74eedf70b44_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0bfd8eca77a025bb5d35d74eedf70b44_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0bfd8eca77a025bb5d35d74eedf70b44_JaffaCakes118
-
Size
206KB
-
MD5
0bfd8eca77a025bb5d35d74eedf70b44
-
SHA1
aa3feb55d7c3627719ee0804c808e831b2544866
-
SHA256
02e276f1d1492eb1b8f1562842c38fd6b23f70409d66a47b8379d7f14fceab47
-
SHA512
477300a534db0a973279d34a19c84c24edd9993302e4ac7129ba16944001bbdee684be150e951f8730bacaab557ab1dd0f1abf4ffb20540a8d176d1fa29d99a4
-
SSDEEP
3072:owMxwtshL9YCOQGxhF+rUQfvNBFy8Jn6OfVuLZ5c:Jyw69FOQGxh6UQfnFy8J/tM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0bfd8eca77a025bb5d35d74eedf70b44_JaffaCakes118
Files
-
0bfd8eca77a025bb5d35d74eedf70b44_JaffaCakes118.exe windows:4 windows x86 arch:x86
b9ab13baf3866200f189d1a74147ab13
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
UnhookWindowsHookEx
WindowFromPoint
GetClipboardData
GetMenuItemInfoA
PostMessageA
DispatchMessageW
OemToCharA
GetMenuState
EqualRect
GetTopWindow
EnumThreadWindows
GetKeyState
ShowOwnedPopups
SetClassLongA
GetLastActivePopup
GetForegroundWindow
SetScrollPos
DestroyCursor
GetKeyboardType
MapVirtualKeyA
GetSystemMetrics
SetForegroundWindow
RegisterClipboardFormatA
GetMenuItemID
MessageBoxA
SetWindowsHookExA
FillRect
DrawTextA
OpenClipboard
WaitMessage
GetIconInfo
GetKeyboardLayout
EnumWindows
SetActiveWindow
LoadCursorA
IsChild
RemovePropA
LoadIconA
CreateWindowExA
KillTimer
EnableMenuItem
InvalidateRect
EnableWindow
GetParent
AdjustWindowRectEx
GetKeyboardState
GetMessagePos
ScreenToClient
CharNextA
CharLowerBuffA
GetDC
DestroyWindow
GetScrollPos
UnregisterClassA
GetClassLongA
GetFocus
ActivateKeyboardLayout
CharNextW
MoveWindow
GetWindow
GetWindowLongA
DefFrameProcA
DestroyIcon
SetParent
IsIconic
PeekMessageW
DrawFrameControl
RegisterClassA
wsprintfA
IsWindowUnicode
InsertMenuA
SetFocus
PeekMessageA
GetPropA
GetClientRect
SetMenu
GetWindowTextA
EnableScrollBar
DrawIcon
SetTimer
GetWindowPlacement
IsDialogMessageA
GetWindowDC
FrameRect
DestroyMenu
SetMenuItemInfoA
EmptyClipboard
LoadKeyboardLayoutA
SendMessageA
DrawEdge
PostQuitMessage
BeginPaint
GetClassInfoA
SetCapture
SetPropA
DrawMenuBar
GetCapture
GetWindowRect
IsZoomed
EndPaint
IsDialogMessageW
MessageBeep
InflateRect
RedrawWindow
TranslateMDISysAccel
SendMessageW
GetCursorPos
IntersectRect
GetMenuStringA
GetMenuItemCount
TrackPopupMenu
DispatchMessageA
SetWindowTextA
IsWindowVisible
GetDlgItem
GetCursor
SetScrollInfo
GetSysColor
GetClassNameA
SetScrollRange
ReleaseCapture
OffsetRect
UpdateWindow
CallWindowProcA
IsWindow
IsRectEmpty
LoadStringA
PtInRect
SetWindowLongW
GetSysColorBrush
GetDesktopWindow
MapWindowPoints
CharToOemA
TranslateMessage
DeleteMenu
CloseClipboard
ShowScrollBar
SetWindowLongA
CharLowerA
GetSubMenu
ScrollWindow
SetWindowPos
GetSystemMenu
GetScrollRange
SetClipboardData
CharUpperBuffA
ChildWindowFromPoint
GetWindowLongW
CreateMenu
SetCursor
SetRect
GetMenu
ReleaseDC
SetWindowPlacement
LoadBitmapA
DrawIconEx
DrawAnimatedRects
GetDCEx
CallNextHookEx
GetWindowThreadProcessId
GetActiveWindow
GetKeyboardLayoutNameA
CheckMenuItem
GetKeyNameTextA
RegisterWindowMessageA
SystemParametersInfoA
CreateIcon
GetScrollInfo
EnumChildWindows
InsertMenuItemA
MsgWaitForMultipleObjects
CreatePopupMenu
DefWindowProcA
msvcrt
tan
strlen
atan
malloc
memcpy
time
_acmdln
srand
advapi32
RegEnumKeyExA
GetUserNameA
RegOpenKeyExA
gdi32
GetBitmapBits
GetObjectA
CreateBrushIndirect
GetRgnBox
CreateFontIndirectA
GetClipBox
CreateCompatibleDC
GetDIBColorTable
GetPaletteEntries
GetPixel
kernel32
CloseHandle
GetEnvironmentStrings
InitializeCriticalSection
GetLocalTime
GetFileAttributesA
GetCommandLineW
MoveFileExA
CompareStringA
ResetEvent
CreateEventA
GlobalDeleteAtom
lstrlenW
GetCommandLineA
GetModuleHandleA
VirtualAllocEx
GetCurrentProcess
CreateFileA
HeapDestroy
GlobalFindAtomA
lstrlenA
GlobalAlloc
GetVersionExA
GetProcAddress
ExitProcess
EnumCalendarInfoA
GetLastError
LoadLibraryA
IsBadReadPtr
SetErrorMode
GetModuleFileNameA
ExitThread
Sections
.text Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc0 Size: 1024B - Virtual size: 1010B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc5 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc2 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc8 Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc7 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 992B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ