Static task
static1
Behavioral task
behavioral1
Sample
0e0f790b62044335bfac0a2c2a5f86d0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0e0f790b62044335bfac0a2c2a5f86d0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0e0f790b62044335bfac0a2c2a5f86d0_JaffaCakes118
-
Size
174KB
-
MD5
0e0f790b62044335bfac0a2c2a5f86d0
-
SHA1
624331469ecf17edfddd69af649751c44c41e064
-
SHA256
1baf9faabb473646d9074442e5a5c9f5744932f8ffcf6025e84e457b6712f0f9
-
SHA512
796da2697cbd5d44c36debaa76502a9d29370fefb4a291912a704c9b3b8f730eb52e4d269e8ef4e8ec2ae865df2e4286628351efe97dd9d9e98b0f34753bb177
-
SSDEEP
3072:j8fYImH+FOf3RLGO+YbR55B418To+ItF/lndzsJDBz9+F/FV32WpN:j8wJ4Of3RPbbfz5kcl6/F52W3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e0f790b62044335bfac0a2c2a5f86d0_JaffaCakes118
Files
-
0e0f790b62044335bfac0a2c2a5f86d0_JaffaCakes118.exe windows:5 windows x86 arch:x86
7562bafa1fb84e609998f9c613874a10
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
FillRect
GetClientRect
BeginPaint
DefWindowProcW
DrawTextW
EndPaint
CreateWindowExW
GetAltTabInfoW
SetMenuInfo
CreateDialogIndirectParamA
RealGetWindowClassA
DdeFreeDataHandle
UnhookWindowsHook
DlgDirListW
CreateCursor
CloseDesktop
VkKeyScanA
KillTimer
ScreenToClient
GetMessagePos
CallWindowProcW
IsWindowVisible
LoadBitmapW
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuW
CreatePopupMenu
GetSystemMetrics
EndDialog
EnableMenuItem
GetSystemMenu
SetClassLongW
IsWindowEnabled
SetWindowPos
DialogBoxParamW
CheckDlgButton
IsWindow
SystemParametersInfoW
RegisterClassW
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharNextA
CharUpperW
CharPrevW
DispatchMessageW
PeekMessageW
wsprintfA
DestroyWindow
CreateDialogParamW
SetTimer
SetWindowTextW
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfW
SendMessageTimeoutW
LoadCursorW
SetCursor
GetWindowLongW
GetSysColor
CharNextW
GetClassInfoW
ExitWindowsEx
FindWindowExW
GetDlgItem
SetWindowLongW
LoadImageW
GetDC
EnableWindow
InvalidateRect
SendMessageW
shell32
ShellExecuteA
dbghelp
ImagehlpApiVersionEx
SymGetLineNext64
FindDebugInfoFile
SymSetSearchPath
SymGetSymFromAddr
SymGetSymPrev
kernel32
GetVersion
SetEnvironmentVariableA
CompareStringW
SetStdHandle
WriteConsoleW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapSize
IsProcessorFeaturePresent
HeapReAlloc
RtlUnwind
LCMapStringW
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
GetTimeZoneInformation
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetLocaleInfoW
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
DecodePointer
EncodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
HeapAlloc
HeapCreate
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetDateFormatA
GetTimeFormatA
GetSystemTimeAsFileTime
InterlockedIncrement
InterlockedDecrement
HeapFree
WriteProfileStringA
FatalAppExitW
TransmitCommChar
FileTimeToDosDateTime
GetLogicalDriveStringsA
ScrollConsoleScreenBufferW
SetFileTime
CompareFileTime
SearchPathW
GetShortPathNameW
GetFullPathNameW
MoveFileW
SetCurrentDirectoryW
GetFileAttributesW
GetLastError
CreateDirectoryW
SetFileAttributesW
Sleep
GetTickCount
CreateFileW
GetFileSize
GetModuleFileNameW
lstrcpynA
DeleteFileW
FindFirstFileW
FindNextFileW
FindClose
SetFilePointer
MultiByteToWideChar
ReadFile
WriteFile
lstrlenA
MulDiv
WideCharToMultiByte
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GlobalFree
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
ExpandEnvironmentStringsW
lstrcmpW
lstrcmpiW
RemoveDirectoryW
lstrcpyA
GetSystemDirectoryW
GetVersionExW
lstrcpyW
OpenProcess
GetModuleHandleA
LoadLibraryA
GetProcAddress
lstrcatW
GetTempFileNameW
lstrcmpiA
CreateProcessW
LoadLibraryW
CreateThread
GlobalLock
GlobalUnlock
GetDiskFreeSpaceW
lstrcpynW
lstrlenW
CloseHandle
SetErrorMode
GetCommandLineW
GetTempPathW
GetWindowsDirectoryW
ExitProcess
CopyFileW
GetCurrentProcess
Sections
.text Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.BSS Size: 8KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ