Static task
static1
Behavioral task
behavioral1
Sample
2733c6b54d493d33138a8eecb6bd2d91_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2733c6b54d493d33138a8eecb6bd2d91_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2733c6b54d493d33138a8eecb6bd2d91_JaffaCakes118
-
Size
292KB
-
MD5
2733c6b54d493d33138a8eecb6bd2d91
-
SHA1
a023727f6439a1b000a76fbfa06d7ff118c79429
-
SHA256
b241b6d90619ed9972360e0060b8628a5a9820003415dc102ab083b373cdc21b
-
SHA512
7c82804925379a66447563334dbec6014145e6de1420e214daaab357832842fb6bbea512946163e374c3805598faaefd1d29de2e118e58c1a3c8edbed178023e
-
SSDEEP
6144:bgFy4KEvk2L4etAVSnsUNkd3nBQoCZjJ:bgk2LMVlZBQoO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2733c6b54d493d33138a8eecb6bd2d91_JaffaCakes118
Files
-
2733c6b54d493d33138a8eecb6bd2d91_JaffaCakes118.exe windows:4 windows x86 arch:x86
4cbbb526cf95b39e5cff4c882858412d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
SetConsoleCursorInfo
GetCurrentProcessId
GetPrivateProfileSectionNamesW
LocalAlloc
VirtualProtectEx
HeapCreate
GetSystemWindowsDirectoryA
CallNamedPipeA
OutputDebugStringA
SetConsoleFont
GlobalHandle
GetCommMask
HeapReAlloc
WriteConsoleOutputCharacterW
SetFileTime
GetSystemDirectoryA
GetCPInfoExA
EnumResourceNamesA
GetUserGeoID
GetComputerNameA
HeapWalk
WaitCommEvent
LocalAlloc
AddAtomA
ReleaseMutex
BuildCommDCBA
IsBadReadPtr
CreateFileMappingW
HeapFree
SetComputerNameExW
LockFileEx
GetThreadContext
WaitForDebugEvent
GetThreadTimes
FileTimeToDosDateTime
GetPriorityClass
SetConsoleCursorMode
LZClose
ReadConsoleInputA
GetFileType
GetConsoleAliasA
GetSystemTimeAdjustment
GetVolumePathNameA
SetSystemTimeAdjustment
SetLocalPrimaryComputerNameA
GetConsoleCursorMode
OpenMutexA
GetLocalTime
GetExpandedNameA
FindFirstFileExW
GetStringTypeExW
SetInformationJobObject
FlushFileBuffers
SetThreadPriority
GetProfileStringA
GetFileTime
GetNativeSystemInfo
GetProcessIoCounters
UnlockFile
SetConsoleNumberOfCommandsA
VirtualAllocEx
GetConsoleAliasExesLengthA
SetTapeParameters
GetProfileIntA
GetLocaleInfoA
CreateWaitableTimerA
GetProcessHeaps
FreeEnvironmentStringsA
GetWriteWatch
GetConsoleOutputCP
OpenEventA
SetCommMask
GetTapePosition
GetVolumePathNamesForVolumeNameA
ReadConsoleOutputA
SetTimerQueueTimer
lstrcmpiA
SetConsoleMode
ResetEvent
GetExitCodeProcess
SetConsoleWindowInfo
GetModuleFileNameA
GetCurrentDirectoryA
GlobalAlloc
GetExitCodeThread
GetPrivateProfileIntA
HeapSize
RemoveDirectoryA
Module32First
GetCommandLineA
GetProcessPriorityBoost
GetConsoleCursorInfo
winmm
timeGetSystemTime
user32
CreateDialogParamA
EnumDisplaySettingsA
CreateAcceleratorTableA
DestroyAcceleratorTable
GetClipboardFormatNameA
GetWindowTextA
GetAncestor
GetInputDesktop
GetGUIThreadInfo
UnhookWindowsHookEx
SendNotifyMessageA
GetAncestor
RegisterClassExA
DlgDirListComboBoxW
UpdateLayeredWindow
EnterReaderModeHelper
PaintMenuBar
BringWindowToTop
GetKBCodePage
SetTaskmanWindow
SetSystemMenu
RegisterClassA
IsWindow
GetScrollBarInfo
ScreenToClient
GetNextDlgGroupItem
DialogBoxIndirectParamA
CloseDesktop
GetNextDlgTabItem
LockWorkStation
ScrollWindowEx
GetUserObjectInformationA
LoadMenuIndirectA
ChildWindowFromPoint
DrawMenuBar
GetKeyNameTextA
RegisterRawInputDevices
TranslateAcceleratorA
SendMessageCallbackA
ScrollChildren
SetKeyboardState
RemovePropA
UnionRect
IsMenu
CharLowerBuffW
ToAscii
PrivateExtractIconsA
SetMenuInfo
IsDialogMessage
PrintWindow
ChangeDisplaySettingsA
AnimateWindow
SetWindowLongA
GetMonitorInfoA
DestroyAcceleratorTable
AppendMenuA
DialogBoxIndirectParamAorW
SetWindowRgn
SystemParametersInfoA
GetFocus
SetShellWindow
InsertMenuItemW
PtInRect
NotifyWinEvent
CallMsgFilterA
SetCursorContents
BeginPaint
SetCursorPos
MapVirtualKeyExW
CharUpperBuffA
RemoveMenu
UnloadKeyboardLayout
DefDlgProcA
LoadIconA
SetPropA
MenuWindowProcA
CharToOemBuffA
SetDlgItemInt
TabbedTextOutA
LoadStringA
GetClassInfoExW
UnregisterUserApiHook
Sections
.idata Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.itext Size: 276KB - Virtual size: 278KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ