Static task
static1
Behavioral task
behavioral1
Sample
120f8a3ff4e3e1a686c82817aadd81c0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
120f8a3ff4e3e1a686c82817aadd81c0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
120f8a3ff4e3e1a686c82817aadd81c0_JaffaCakes118
-
Size
268KB
-
MD5
120f8a3ff4e3e1a686c82817aadd81c0
-
SHA1
2f2f11b6efa994f0b3763bafe19cebff39561c6e
-
SHA256
e25d6e79e080366d03979b80269165b2296b7a7c47ee58bd1c8fcec652e32bd1
-
SHA512
6430b2360cab6a9efa2566f216d720cf7a3fafb76a97c3292bc91cb67fc65148264e5a081b3bf314ebdbf4edd4864868b88f68f5467a1ddc687fe1f2210004a5
-
SSDEEP
6144:4WqyPSsw1ByyFTEb4SlhfyQeBsvqLhUBGJLV/S4+/+:4vyPSn1nFw4Slhfy7BwgUBIH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 120f8a3ff4e3e1a686c82817aadd81c0_JaffaCakes118
Files
-
120f8a3ff4e3e1a686c82817aadd81c0_JaffaCakes118.exe windows:4 windows x86 arch:x86
34db9225522e361828ec8b2b2a8102bf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
LoadLibraryA
RtlUnwind
InterlockedExchange
VirtualQuery
HeapReAlloc
HeapAlloc
HeapFree
VirtualAlloc
GetExitCodeThread
Heap32Next
GetFileAttributesExW
GetNumberOfConsoleMouseButtons
GetSystemDefaultLangID
lstrcatW
FileTimeToDosDateTime
GlobalFlags
GetLocalTime
PulseEvent
GetDiskFreeSpaceW
TerminateThread
SetConsoleTitleW
GetCompressedFileSizeA
DisconnectNamedPipe
GetConsoleTitleW
EnumResourceLanguagesA
GetFullPathNameW
GlobalLock
MapViewOfFileEx
DeleteCriticalSection
GetTempPathA
HeapLock
FormatMessageA
RtlFillMemory
GetFileType
GlobalAlloc
GetLocaleInfoA
GetEnvironmentVariableW
SetConsoleCP
SuspendThread
GetLogicalDriveStringsA
OpenWaitableTimerA
DisableThreadLibraryCalls
CreateRemoteThread
CreateNamedPipeW
GetStdHandle
CreateDirectoryW
LocalHandle
GetLongPathNameA
SetCurrentDirectoryW
LocalLock
GetTimeFormatA
SetLastError
GlobalReAlloc
TlsFree
GetCurrentDirectoryW
HeapValidate
SetFileTime
PeekNamedPipe
SetThreadContext
OpenMutexW
GetHandleInformation
GetFullPathNameA
SetVolumeLabelW
OpenEventW
CreateSemaphoreW
IsValidLocale
GetVersionExW
GetTempPathW
CreateDirectoryExA
Toolhelp32ReadProcessMemory
GetCurrentDirectoryA
WriteFile
GetCompressedFileSizeW
Heap32First
GetVersion
GetProcessAffinityMask
GetLocaleInfoW
FindAtomA
GetTimeFormatW
SetLocaleInfoA
SetConsoleOutputCP
DebugBreak
EnterCriticalSection
WritePrivateProfileSectionW
SetConsoleTextAttribute
GetConsoleCP
lstrcpyn
SetSystemTimeAdjustment
GetConsoleScreenBufferInfo
ReadConsoleInputW
GetAtomNameA
SleepEx
GetPrivateProfileStructW
IsDebuggerPresent
ReadFileEx
SetVolumeLabelA
GlobalSize
WriteConsoleOutputAttribute
SetConsoleTitleA
GetPrivateProfileSectionNamesW
CreateWaitableTimerA
LocalCompact
FileTimeToLocalFileTime
LocalFileTimeToFileTime
LoadLibraryExA
GetProfileIntW
Thread32First
EnumCalendarInfoExA
CloseHandle
GetStringTypeA
UnhandledExceptionFilter
EraseTape
CreateMailslotA
SetPriorityClass
GetFileAttributesExA
AddAtomA
IsValidCodePage
SetConsoleActiveScreenBuffer
PeekConsoleInputW
GetProcessHeap
GetFileAttributesA
WriteConsoleOutputCharacterA
lstrcpynW
GetCalendarInfoW
CreateDirectoryExW
EnumResourceNamesW
SetThreadPriorityBoost
FoldStringA
GetConsoleOutputCP
OpenFileMappingA
GetShortPathNameA
RtlMoveMemory
FreeConsole
SystemTimeToTzSpecificLocalTime
FindNextFileW
GetStringTypeW
FindNextChangeNotification
GetLogicalDrives
DeleteAtom
SetThreadExecutionState
WaitNamedPipeA
FindResourceExA
GetPrivateProfileSectionW
Module32Next
GetNumberFormatA
GetTempFileNameW
WriteProfileStringW
ReadDirectoryChangesW
WritePrivateProfileStringA
GlobalFindAtomW
InterlockedExchangeAdd
FillConsoleOutputCharacterW
GetVolumeInformationA
SetConsoleCursorInfo
GetLongPathNameW
SetThreadIdealProcessor
RtlZeroMemory
VirtualAllocEx
WriteProcessMemory
SetEvent
GetQueuedCompletionStatus
HeapCreate
GetConsoleCursorInfo
Heap32ListNext
Module32First
ExitThread
VirtualQueryEx
GlobalUnfix
GlobalFree
GetModuleHandleW
CreateConsoleScreenBuffer
GetThreadPriorityBoost
GetLogicalDriveStringsW
CreateMutexA
GlobalFindAtomA
TransactNamedPipe
LockFileEx
DebugActiveProcess
GetPrivateProfileIntA
GetFileAttributesW
Heap32ListFirst
ReadConsoleInputA
SetThreadAffinityMask
ReadConsoleA
FreeEnvironmentStringsA
HeapSize
FileTimeToSystemTime
FlushViewOfFile
HeapWalk
GetProcessHeaps
SetConsoleScreenBufferSize
GetTimeZoneInformation
GetCommandLineW
GlobalUnlock
ResetEvent
UnmapViewOfFile
GlobalGetAtomNameW
FlushConsoleInputBuffer
GetShortPathNameW
ConnectNamedPipe
OpenSemaphoreW
SetEnvironmentVariableA
FillConsoleOutputCharacterA
WaitForMultipleObjects
ResetWriteWatch
OpenFileMappingW
ReadFile
GetUserDefaultLCID
GetPrivateProfileSectionNamesA
GlobalAddAtomW
GetDiskFreeSpaceExW
GetCommandLineA
GetThreadLocale
GetThreadTimes
WaitCommEvent
EnumResourceTypesW
InitAtomTable
DefineDosDeviceW
InterlockedIncrement
HeapCompact
DosDateTimeToFileTime
GetConsoleMode
GetComputerNameW
EnumCalendarInfoA
ReadConsoleOutputA
GetThreadSelectorEntry
ReadConsoleOutputCharacterW
GetDateFormatA
GetDriveTypeA
GetSystemDirectoryW
GlobalGetAtomNameA
GetThreadPriority
GetPrivateProfileStringW
lstrlenW
GetCurrencyFormatA
SearchPathW
LoadLibraryW
GetSystemDefaultLCID
GetACP
GetNamedPipeHandleStateW
LocalUnlock
GetProfileStringW
UpdateResourceA
MultiByteToWideChar
GetStartupInfoW
GetCurrentThread
SetFilePointer
WritePrivateProfileSectionA
SearchPathA
GetTempFileNameA
EnumCalendarInfoW
GetMailslotInfo
CopyFileA
InitializeCriticalSection
GetProfileSectionA
FindFirstFileExA
WaitForDebugEvent
OpenProcess
SignalObjectAndWait
GetStringTypeExA
GlobalWire
CreateMailslotW
EnumSystemCodePagesW
OpenWaitableTimerW
GetDriveTypeW
WriteProfileSectionW
EnumResourceNamesA
InterlockedCompareExchange
SetFileAttributesW
GetEnvironmentStringsW
gdi32
SetBrushOrgEx
EnumICMProfilesA
SetMapperFlags
GetOutlineTextMetricsW
PatBlt
CloseEnhMetaFile
PolyBezier
CreateHalftonePalette
OffsetWindowOrgEx
ExtFloodFill
GetWindowOrgEx
GetObjectType
SetICMProfileA
SetPolyFillMode
SetRectRgn
DescribePixelFormat
GetTextExtentPoint32A
UpdateICMRegKeyA
SetFontEnumeration
GetTextFaceW
PaintRgn
CloseFigure
SelectClipRgn
GetCharWidthFloatA
GetCharWidthA
CopyMetaFileW
ExtSelectClipRgn
SetBoundsRect
EnableEUDC
CreateDIBSection
GetMetaRgn
GetBrushOrgEx
GetROP2
RemoveFontResourceA
GetTextAlign
GetStockObject
PlayEnhMetaFile
PlgBlt
GetEnhMetaFileDescriptionW
BitBlt
SetDIBits
GetTextFaceA
GetAspectRatioFilterEx
ExtCreateRegion
GetTextExtentExPointW
DeviceCapabilitiesExW
PolyDraw
GetCharWidthW
SetArcDirection
GetCharWidth32W
GetNearestPaletteIndex
GetICMProfileW
SetBitmapDimensionEx
GetTextExtentPointW
IntersectClipRect
CreateMetaFileW
StretchDIBits
PolyPolygon
FrameRgn
GetCharABCWidthsA
GetCharABCWidthsFloatW
GetBkMode
RoundRect
SetMagicColors
SetDeviceGammaRamp
StretchBlt
CreatePatternBrush
CreateDiscardableBitmap
RectVisible
GetLayout
Arc
CancelDC
GetClipBox
SetPixelFormat
SaveDC
SetPaletteEntries
AddFontResourceA
RestoreDC
EnumFontsW
GetLogColorSpaceW
SelectClipPath
GetObjectA
EnumFontFamiliesExA
CreateRoundRectRgn
EnumFontsA
GetEnhMetaFilePaletteEntries
Sections
.text Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ