Static task
static1
Behavioral task
behavioral1
Sample
13c238b3607c5f35080e908a575db9d4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
13c238b3607c5f35080e908a575db9d4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
13c238b3607c5f35080e908a575db9d4_JaffaCakes118
-
Size
817KB
-
MD5
13c238b3607c5f35080e908a575db9d4
-
SHA1
8c97abe0be44b8fde8bf7b5345870ac6f9f779ba
-
SHA256
a0652516da8bb0a1d8810ceaee3f98c75ce5e55a3c31d1af5e2ed8b1498b890a
-
SHA512
f6a1cc4ab45df91da8342315ddd8b3e7ee6ba53e4aea09af444d2907631d5c9c2099e880d34273b9c9788081a4d8bd562edd88e187e83dc5641e702105698f21
-
SSDEEP
12288:k2tcVG7xqmijRNxtcVG7DpDZMiFMIRBp1ApDZMiFMIRBTpDZMiFMIRB:ZAGlXcbAG5DZMo9H1CDZMo97DZMo9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 13c238b3607c5f35080e908a575db9d4_JaffaCakes118
Files
-
13c238b3607c5f35080e908a575db9d4_JaffaCakes118.exe windows:4 windows x86 arch:x86
ddcf8c86d384ac8ba0c68bea71c104e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
log10
memcpy
fopen
fseek
fclose
strlen
strcpy
strcat
sprintf
strcmp
strncmp
fabs
ceil
malloc
floor
free
strncpy
memmove
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
LoadLibraryA
GetProcAddress
Sleep
FreeLibrary
HeapAlloc
HeapFree
CreateFileA
GetFileSize
ReadFile
CloseHandle
CreateThread
GetCurrentThreadId
GetCurrentProcessId
InitializeCriticalSection
GetEnvironmentVariableA
SetEnvironmentVariableA
GetCurrentProcess
DuplicateHandle
CreatePipe
GetStdHandle
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
GetTickCount
SetLastError
GetVersionExA
TlsAlloc
MulDiv
GetDriveTypeA
FindFirstFileA
FindClose
GetFileAttributesA
SetFileAttributesA
CopyFileA
DeleteFileA
WriteFile
SetFilePointer
HeapReAlloc
TlsGetValue
TlsSetValue
DeleteCriticalSection
TlsFree
WaitForMultipleObjects
GetCurrentThread
CreateSemaphoreA
ReleaseSemaphore
user32
AnimateWindow
FindWindowA
FindWindowExA
GetWindowRect
GetSystemMetrics
BeginPaint
EndPaint
DefWindowProcA
LoadIconA
RegisterClassExA
CreateWindowExA
MessageBoxA
GetWindowThreadProcessId
IsWindowVisible
GetWindowLongA
GetForegroundWindow
IsWindowEnabled
EnableWindow
EnumWindows
SetWindowPos
DestroyWindow
GetSysColor
GetSysColorBrush
SendMessageA
RedrawWindow
CallWindowProcA
RemovePropA
SetWindowLongA
SetPropA
GetParent
GetPropA
GetWindow
SetActiveWindow
UnregisterClassA
DestroyAcceleratorTable
LoadCursorA
RegisterClassA
AdjustWindowRectEx
GetActiveWindow
ShowWindow
CreateAcceleratorTableA
PeekMessageA
MsgWaitForMultipleObjects
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
GetClientRect
GetMenu
ScreenToClient
SetCursorPos
LoadImageA
SetCursor
MapWindowPoints
MoveWindow
SystemParametersInfoA
GetKeyState
SetCapture
PostMessageA
GetCursorPos
ReleaseCapture
SetFocus
GetFocus
FillRect
EnumChildWindows
DefFrameProcA
IsChild
GetClassNameA
InvalidateRect
DestroyIcon
gdi32
GetStockObject
SetBkColor
SetTextColor
CreateSolidBrush
DeleteObject
GetObjectA
CreateCompatibleDC
GetDIBits
DeleteDC
GetObjectType
CreateDIBSection
SelectObject
BitBlt
CreateBitmap
SetPixel
CreateDCA
GetDeviceCaps
CreateFontA
advapi32
RegOpenKeyExA
RegConnectRegistryA
RegSetValueExA
RegCloseKey
comctl32
InitCommonControlsEx
ole32
CoInitialize
RevokeDragDrop
shell32
ShellExecuteExA
winmm
timeBeginPeriod
timeEndPeriod
Sections
.code Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 582B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 629KB - Virtual size: 630KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ