Static task
static1
Behavioral task
behavioral1
Sample
0ec7a2c28652b1bce88c4e08273f6121_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0ec7a2c28652b1bce88c4e08273f6121_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0ec7a2c28652b1bce88c4e08273f6121_JaffaCakes118
-
Size
101KB
-
MD5
0ec7a2c28652b1bce88c4e08273f6121
-
SHA1
30bcceddc8e2cdcfa670390857057f9eedd667f2
-
SHA256
e1105edca89500e22829efbea3c6fb9902994f453bc7d01b9da655a6b148774c
-
SHA512
e2db5a365cd6c01e509271c9da78db12f232382369cc2d45259a812f85d601ace74b163a34b1edab951432b2305811aa600a34186a0ca8dfb6d7001e3ebe14f8
-
SSDEEP
1536:/EhyxG2IeCmO+h5XGJdZ4XVMiRyOQCqD8cmKzs1+g71MX4sLILGhaUDBaz:/xGH69/X4dyXVMiy7mQsQ1ULGzDgz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ec7a2c28652b1bce88c4e08273f6121_JaffaCakes118
Files
-
0ec7a2c28652b1bce88c4e08273f6121_JaffaCakes118.exe windows:4 windows x86 arch:x86
145d5cb46cf03ca8a577a89be1128bad
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
log10
memmove
mbstowcs
malloc
memcpy
comctl32
ImageList_Destroy
ImageList_Read
ImageList_DrawEx
ImageList_Write
ImageList_Remove
ImageList_DragShowNolock
ImageList_Draw
ImageList_GetBkColor
ImageList_Add
user32
DestroyCursor
GetSysColorBrush
GetDesktopWindow
GetActiveWindow
SetWindowTextA
GetWindow
OffsetRect
GetKeyboardLayout
FrameRect
ActivateKeyboardLayout
DispatchMessageA
SetClassLongA
IsWindowVisible
SystemParametersInfoA
TrackPopupMenu
DrawTextA
GetTopWindow
FillRect
SetActiveWindow
EnumThreadWindows
GetKeyState
GetDCEx
SetWindowLongA
SetWindowPlacement
SetCapture
BeginPaint
GetFocus
DrawIcon
CheckMenuItem
LoadStringA
CreateIcon
GetWindowTextA
SetScrollPos
IsIconic
GetSysColor
IsZoomed
UnhookWindowsHookEx
DestroyIcon
ReleaseDC
SetScrollInfo
ShowScrollBar
EnableScrollBar
EnumChildWindows
MapVirtualKeyA
AdjustWindowRectEx
CharToOemA
DefFrameProcA
RegisterWindowMessageA
CharUpperBuffA
GetCursorPos
ShowWindow
GetMessagePos
GetMenuStringA
SetMenu
GetClipboardData
SetForegroundWindow
GetClientRect
CharNextW
GetKeyboardType
GetClassInfoA
MoveWindow
KillTimer
LoadIconA
RegisterClassA
DrawMenuBar
GetSubMenu
DrawIconEx
EnableWindow
ChildWindowFromPoint
EmptyClipboard
IsDialogMessageW
ClientToScreen
DeleteMenu
IntersectRect
CloseClipboard
GetMenuItemCount
CreateMenu
PeekMessageA
SetTimer
UpdateWindow
PtInRect
GetClassLongA
CreatePopupMenu
GetKeyNameTextA
GetCapture
GetWindowRect
SetMenuItemInfoA
RegisterClipboardFormatA
PostMessageA
DrawEdge
CharNextA
SetCursor
ReleaseCapture
DefWindowProcA
GetWindowLongW
SetClipboardData
InflateRect
EqualRect
GetWindowThreadProcessId
FindWindowA
DrawAnimatedRects
WindowFromPoint
LoadKeyboardLayoutA
MessageBeep
SetPropA
GetPropA
GetScrollRange
SetWindowLongW
SendMessageW
IsWindowUnicode
SetWindowPos
SetFocus
SetScrollRange
EndPaint
SendMessageA
RedrawWindow
GetMenu
MsgWaitForMultipleObjects
GetMenuState
InvalidateRect
GetParent
GetWindowPlacement
RemoveMenu
GetScrollPos
IsWindowEnabled
SetRect
ScreenToClient
GetWindowDC
TranslateMDISysAccel
GetKeyboardLayoutList
MessageBoxA
PeekMessageW
GetKeyboardState
GetSystemMenu
GetCursor
GetIconInfo
InsertMenuItemA
CallNextHookEx
ScrollWindow
SetWindowsHookExA
IsRectEmpty
DestroyMenu
wsprintfA
CreateWindowExA
GetDC
CharLowerBuffA
InsertMenuA
LoadCursorA
EnumWindows
IsWindow
OemToCharA
GetLastActivePopup
EnableMenuItem
DispatchMessageW
TranslateMessage
UnregisterClassA
GetForegroundWindow
GetKeyboardLayoutNameA
DestroyWindow
GetClassNameA
CallWindowProcA
GetDlgItem
IsDialogMessageA
LoadBitmapA
PostQuitMessage
ShowOwnedPopups
IsChild
GetMenuItemID
GetSystemMetrics
OpenClipboard
GetMenuItemInfoA
GetWindowLongA
WaitMessage
RemovePropA
SetParent
DefMDIChildProcA
CharLowerA
MapWindowPoints
DrawFrameControl
kernel32
GetLocalTime
GetFileType
GetCommandLineA
GetFileSize
InitializeCriticalSection
CompareStringA
DeleteFileA
VirtualFree
GetVersion
ExitThread
DeleteCriticalSection
lstrcatA
GetLocaleInfoA
SetErrorMode
GetCurrentThreadId
FindResourceA
GlobalDeleteAtom
CreateThread
LoadResource
SizeofResource
lstrcmpA
WideCharToMultiByte
SetEvent
GlobalFindAtomA
RaiseException
lstrcpynA
MulDiv
WriteFile
lstrlenA
GetStringTypeW
VirtualAllocEx
SetFilePointer
FindFirstFileA
lstrcpyA
GetStringTypeA
GetACP
WaitForSingleObject
SetThreadLocale
ResetEvent
HeapFree
Sleep
GetCurrentThread
LocalFree
LoadLibraryA
SetLastError
GetStartupInfoA
LockResource
HeapDestroy
LocalReAlloc
EnumCalendarInfoA
HeapAlloc
GetTickCount
GetDateFormatA
FormatMessageA
GetLastError
lstrcmpiA
GetEnvironmentStrings
CloseHandle
MoveFileA
GetStdHandle
GetDiskFreeSpaceA
SetHandleCount
GetModuleFileNameA
GetCPInfo
CreateEventA
CreateFileA
GetFullPathNameA
ReadFile
GetModuleHandleA
GetThreadLocale
FreeResource
LoadLibraryExA
VirtualAlloc
FindClose
GetOEMCP
GetSystemDefaultLangID
GetProcAddress
GlobalAlloc
FreeLibrary
GetCurrentProcessId
GetCurrentProcess
GetUserDefaultLCID
ExitProcess
LocalAlloc
version
VerInstallFileA
VerQueryValueA
ole32
OleRun
CLSIDFromProgID
CoRegisterClassObject
CoReleaseMarshalData
CoCreateFreeThreadedMarshaler
StringFromIID
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.init Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE