Static task
static1
Behavioral task
behavioral1
Sample
13dbd742b2371fcf2f376b766884cf90_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
13dbd742b2371fcf2f376b766884cf90_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
13dbd742b2371fcf2f376b766884cf90_JaffaCakes118
-
Size
130KB
-
MD5
13dbd742b2371fcf2f376b766884cf90
-
SHA1
1b80b8cb8539230dd79fa8b2b06682f1d35619f8
-
SHA256
018daa8d49e1da3ac6fb63580367e2f43b1d6f056705f5b17679918f2665f43c
-
SHA512
51ca485430f888b0b8ed2b866d4e74fffe27db866f70af7eda9f2cc6ecfcc8c2f3e4e0b4a8464a24ecad920b3ba07cda8f402312d00c25e7791e8509771a73e0
-
SSDEEP
3072:MTLD5gEuKqLsO8nUrWqhjjjjjjjjjYxmsMyi7JR:Y5RDqLonrxms
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 13dbd742b2371fcf2f376b766884cf90_JaffaCakes118
Files
-
13dbd742b2371fcf2f376b766884cf90_JaffaCakes118.exe windows:5 windows x86 arch:x86
6f897fc7b0c4acb22fc15c4cb5373908
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
OpenSemaphoreW
ProcessIdToSessionId
QueryPerformanceCounter
ReadFile
ReleaseSemaphore
SetEndOfFile
SetErrorMode
SetEvent
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
MultiByteToWideChar
TerminateProcess
TerminateThread
UnhandledExceptionFilter
UnmapViewOfFile
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
MulDiv
MapViewOfFile
LocalUnlock
LocalSize
LocalReAlloc
LocalLock
LocalFree
LoadResource
LoadLibraryA
InterlockedCompareExchange
GlobalUnlock
GlobalLock
GlobalFree
GetVersion
GetUserDefaultUILanguage
GetUserDefaultLCID
GetTimeFormatW
GetTickCount
GetSystemTimeAsFileTime
GetSystemInfo
GetStartupInfoA
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFileInformationByHandle
GetFileAttributesW
GetDateFormatW
GetCurrentThreadId
GetCurrentProcessId
GetComputerNameW
GetCommandLineW
GetACP
FreeLibrary
FormatMessageW
FoldStringW
FindResourceExW
FindFirstFileW
FindClose
ExpandEnvironmentStringsW
ExitProcess
DeleteFileW
CreateThread
CreateSemaphoreW
CreateFileMappingW
CreateDirectoryW
CompareStringW
CloseHandle
VirtualAlloc
GetCurrentProcess
GetStartupInfoW
GlobalAlloc
GetWindowsDirectoryW
lstrcatW
Sleep
CreateFileW
user32
RegisterClassW
RegisterWindowMessageW
ScreenToClient
SendDlgItemMessageW
SendMessageW
SetActiveWindow
SetCursor
SetDlgItemTextA
SetDlgItemTextW
SetFocus
SetForegroundWindow
SetScrollPos
SetTimer
SetWinEventHook
SetWindowLongW
SetWindowPlacement
SetWindowTextW
ShowWindow
TranslateAcceleratorW
TranslateMessage
UnhookWinEvent
UpdateWindow
WinHelpW
wsprintfW
RegisterClassExW
PostQuitMessage
PostMessageW
PeekMessageW
OpenClipboard
MoveWindow
MessageBoxW
MessageBeep
LoadStringW
LoadImageW
LoadIconW
LoadCursorW
LoadAcceleratorsW
KillTimer
IsIconic
IsDlgButtonChecked
IsDialogMessageW
IsClipboardFormatAvailable
InvalidateRect
GetWindowTextW
GetWindowPlacement
GetWindowLongW
GetSystemMetrics
GetSystemMenu
GetSubMenu
GetParent
GetMessageW
GetMenuState
GetMenu
GetForegroundWindow
GetFocus
GetDlgItemTextW
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDC
GetCursorPos
GetClientRect
EnumChildWindows
EndDialog
EnableWindow
EnableMenuItem
DrawTextExW
DispatchMessageW
DialogBoxParamW
DestroyWindow
DefWindowProcW
DefDlgProcW
CreateWindowExW
CreateDialogParamW
CloseClipboard
ChildWindowFromPoint
CheckMenuItem
CharUpperW
CharNextW
CharLowerW
CallWindowProcW
AppendMenuW
LoadIconA
LoadCursorA
ReleaseDC
DefWindowProcA
GetSysColor
GetKeyboardLayout
gdi32
CreateFontIndirectW
TextOutW
StartPage
StartDocW
SetWindowExtEx
SetViewportExtEx
SetMapMode
SetBkMode
SetAbortProc
LPtoDP
GetTextMetricsW
GetTextFaceW
GetTextExtentPointW
GetTextExtentPoint32W
GetObjectW
GetDeviceCaps
EnumFontsW
EndPage
EndDoc
DeleteObject
GetTextMetricsA
CreateDCW
AbortDoc
GetStockObject
SelectObject
DeleteDC
comdlg32
CommDlgExtendedError
ChooseFontW
FindTextW
GetFileTitleW
GetOpenFileNameW
GetSaveFileNameW
PageSetupDlgW
PrintDlgExW
ReplaceTextW
advapi32
SetSecurityDescriptorDacl
ReportEventW
RegisterEventSourceW
RegSetValueExW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegDeleteValueW
RegCreateKeyW
RegCreateKeyExW
RegCloseKey
ReadEventLogW
OpenEventLogW
IsTextUnicode
InitializeSecurityDescriptor
GetUserNameW
DeregisterEventSource
CloseEventLog
ClearEventLogW
RegOpenKeyA
shell32
DragQueryFileW
DragFinish
DragAcceptFiles
ShellAboutW
msvcrt
memcpy
_XcptFilter
__getmainargs
__initenv
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
_snwprintf
_vsnwprintf
_wcsicmp
_wgetcwd
_wmakepath
_wsplitpath
_wtoi
_wtol
calloc
exit
free
isdigit
isprint
iswctype
localtime
malloc
realloc
sprintf
strchr
swprintf
swscanf
time
tolower
wcscat
wcscmp
wcscpy
wcslen
wcsncmp
wcsncpy
wprintf
Sections
.text Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text2 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ