Static task
static1
Behavioral task
behavioral1
Sample
1613d70a6575adbb0d8aa0c36deaf4b7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1613d70a6575adbb0d8aa0c36deaf4b7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1613d70a6575adbb0d8aa0c36deaf4b7_JaffaCakes118
-
Size
3.8MB
-
MD5
1613d70a6575adbb0d8aa0c36deaf4b7
-
SHA1
c9536c1af226c9e2c69fb5d0e2d7995b165025cf
-
SHA256
af6a7037008f2b40c5c4bfdeef73bf48707aecd19770f241aa8e21f746990a48
-
SHA512
be3b58e40d49743dc532181bbf5758ee8ec5dc93cbfe7db6d2b063b76042743e6afba25281b40f802dc74282d48e99d316277ea11a8bedbb81cf83d9c4c6d698
-
SSDEEP
49152:JnWiisLlu//IcdjhH+U+6uEEvH7X6uEEBt0rMI:JnWiisLG5jhVqvHeqf0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1613d70a6575adbb0d8aa0c36deaf4b7_JaffaCakes118
Files
-
1613d70a6575adbb0d8aa0c36deaf4b7_JaffaCakes118.exe windows:4 windows x86 arch:x86
91d7341bed4fd7b9d25da479a7692c49
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
PlaySoundA
msimg32
TransparentBlt
kernel32
GetFileType
HeapReAlloc
HeapSize
GetACP
GetTimeZoneInformation
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetStdHandle
GetProcAddress
LoadLibraryA
GetTempPathA
LockResource
LoadResource
SizeofResource
FindResourceA
GetModuleHandleA
DeleteFileA
GetWindowsDirectoryA
FreeLibrary
GlobalFree
GlobalUnlock
GlobalLock
lstrcpyA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
GetCurrentThreadId
lstrcatA
GetVersion
GetCurrentThread
lstrcmpA
GlobalAlloc
GetModuleFileNameA
CloseHandle
SetLastError
MulDiv
TerminateProcess
HeapFree
HeapAlloc
RaiseException
ExitProcess
GetCommandLineA
GetStartupInfoA
RtlUnwind
GetTickCount
FileTimeToLocalFileTime
FileTimeToSystemTime
SetErrorMode
GetFileTime
GetFileSize
GetFileAttributesA
lstrlenA
GetProfileStringA
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
GlobalFlags
InterlockedIncrement
FormatMessageA
LocalFree
WideCharToMultiByte
InterlockedDecrement
GetThreadLocale
GetLastError
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
FindFirstFileA
FindClose
MultiByteToWideChar
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
user32
RegisterClipboardFormatA
PostThreadMessageA
GetSysColorBrush
PtInRect
GetClassNameA
DestroyMenu
LoadStringA
InflateRect
CharUpperA
MapDialogRect
SetWindowContextHelpId
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
ClientToScreen
GetMessageA
TranslateMessage
ValidateRect
GetCursorPos
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
MessageBeep
PostMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
GetFocus
SetFocus
CopyRect
GetTopWindow
MessageBoxA
IsChild
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
TrackPopupMenu
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
IsWindowUnicode
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetNextDlgGroupItem
SetRect
CopyAcceleratorTableA
CharNextA
GetMessagePos
GetLastActivePopup
GetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
RegisterWindowMessageA
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
InvalidateRect
CreateMenu
CreatePopupMenu
PostQuitMessage
IsWindowVisible
ScreenToClient
SetCursor
WindowFromDC
SetWindowRgn
SetForegroundWindow
IsIconic
GetSystemMetrics
DrawIcon
FillRect
GetSystemMenu
AppendMenuA
SendMessageA
LoadCursorA
LoadBitmapA
GetDesktopWindow
GetDC
GetClientRect
SetTimer
LoadIconA
EnableWindow
GetWindowRect
AdjustWindowRectEx
gdi32
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
DeleteObject
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
PatBlt
GetMapMode
DPtoLP
GetTextColor
GetBkColor
LPtoDP
SetBkMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
CreateRectRgn
GetPixel
CombineRgn
BitBlt
CreateSolidBrush
GetObjectA
CreateCompatibleDC
GetTextExtentPointA
CreateDIBitmap
CreateCompatibleBitmap
comdlg32
ChooseColorA
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
shell32
Shell_NotifyIconA
comctl32
ImageList_Draw
ImageList_AddMasked
ord17
ImageList_Destroy
ImageList_Create
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleUninitialize
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
OleInitialize
olepro32
ord253
oleaut32
SysStringLen
SysAllocStringByteLen
SysAllocString
VariantChangeType
VariantCopy
VariantTimeToSystemTime
VariantClear
SysAllocStringLen
SysFreeString
Sections
.text Size: 172KB - Virtual size: 170KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.6MB - Virtual size: 3.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ