Static task
static1
Behavioral task
behavioral1
Sample
13b0d88599e1d235fa10054ae0ddaf37_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13b0d88599e1d235fa10054ae0ddaf37_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
13b0d88599e1d235fa10054ae0ddaf37_JaffaCakes118
-
Size
161KB
-
MD5
13b0d88599e1d235fa10054ae0ddaf37
-
SHA1
cdd46003aba879af5e192fc0312f4dc675f9ff3e
-
SHA256
0e49ed65969dc1216cbcac5e120617a07f08a5bbd7157d5aaa5a979f96c3af9f
-
SHA512
47e896802787a7de1a3fa9abd61292e1c4953c68399139c43735f5713defbf503686fc96184ac6cc7ebd896057b70f1ed8027dc39fc155dea4d268b889913e77
-
SSDEEP
3072:ArBdGu/25OUNegglQODLjBbmQaqqHLr0EVpTVO/XIOrWbB3:MdGu25l+Wo9tcLr0cBuXIOrw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 13b0d88599e1d235fa10054ae0ddaf37_JaffaCakes118
Files
-
13b0d88599e1d235fa10054ae0ddaf37_JaffaCakes118.exe windows:4 windows x86 arch:x86
1007e50e04f3c6dd3f1b9b3667635c16
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_Destroy
ImageList_Add
ImageList_DragShowNolock
msvcrt
sprintf
srand
tolower
rand
sqrt
exit
wcsncmp
memcpy
mbstowcs
wcstol
clock
memmove
time
malloc
calloc
atol
swprintf
wcschr
memset
wcscspn
_acmdln
user32
HideCaret
CreatePopupMenu
FillRect
DrawMenuBar
GetDC
DrawIconEx
DrawEdge
SetTimer
GetSysColor
GetCapture
EqualRect
DefWindowProcA
ShowWindow
BeginPaint
SetCursor
FrameRect
MessageBoxA
GetClientRect
GetDCEx
SetWindowLongA
DispatchMessageW
DrawFrameControl
CreateMenu
SetWindowPos
EnumChildWindows
DefMDIChildProcA
FindWindowA
GetWindowTextA
IsWindowVisible
GetScrollRange
CreateWindowExA
EnableScrollBar
GetMenuItemInfoA
GetDesktopWindow
GetCursor
GetIconInfo
GetWindow
GetMessagePos
CharToOemA
GetKeyState
TrackPopupMenu
GetPropA
CallNextHookEx
DispatchMessageA
GetForegroundWindow
DefFrameProcA
DrawIcon
CallWindowProcA
GetClipboardData
ClientToScreen
GetActiveWindow
GetMenuStringA
GetCursorPos
DeferWindowPos
EndDeferWindowPos
RegisterClassA
DrawTextA
IsChild
GetFocus
EndPaint
GetLastActivePopup
CharLowerBuffA
CheckMenuItem
EnumThreadWindows
GetKeyNameTextA
IsDialogMessageA
GetMenu
SetWindowTextA
EnumWindows
GetMenuItemCount
GetScrollInfo
EnableWindow
EnableMenuItem
CharLowerA
GetMenuItemID
GetSysColorBrush
GetSubMenu
IsWindowEnabled
GetMenuState
GetClassLongA
GetClassInfoA
GetScrollPos
SystemParametersInfoA
CharNextA
GetDlgItem
GetParent
kernel32
GetACP
FindResourceA
lstrlenA
HeapFree
HeapDestroy
SetEvent
lstrcpynA
SetEndOfFile
CreateFileA
SetFilePointer
GetCurrentProcessId
VirtualFree
CreateThread
GetTickCount
GetCommandLineA
GlobalAlloc
WideCharToMultiByte
SizeofResource
LocalFree
FindClose
LocalReAlloc
LoadResource
FindFirstFileA
VirtualAlloc
GetCurrentProcess
GetStdHandle
CreateEventA
GetProcAddress
GetVersionExA
EnterCriticalSection
LockResource
lstrcmpiA
GlobalFindAtomA
RaiseException
SetErrorMode
GetDateFormatA
lstrcatA
ExitProcess
GetModuleHandleA
HeapAlloc
FreeLibrary
GetFullPathNameA
GetThreadLocale
LoadLibraryExA
GetStringTypeW
WaitForSingleObject
ReadFile
LocalAlloc
GetCurrentThread
LoadLibraryA
SetThreadLocale
GetEnvironmentStrings
Sleep
GetFileAttributesA
FormatMessageA
GetFileSize
GetProcessHeap
GetCurrentThreadId
VirtualAllocEx
Sections
.tls Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 1KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 1024B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ