Static task
static1
Behavioral task
behavioral1
Sample
2585d60532494d5cb898b4c99ae6bfba_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2585d60532494d5cb898b4c99ae6bfba_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2585d60532494d5cb898b4c99ae6bfba_JaffaCakes118
-
Size
165KB
-
MD5
2585d60532494d5cb898b4c99ae6bfba
-
SHA1
e46c34b1e26e58d5e20957f9c5c04601f3dfd5ac
-
SHA256
dddaf0f0e9d118aed7e08e13d209fe39741ba319b58fb7bd0216dc0b46cf3b46
-
SHA512
a6baaa238c5a2d82072875938e2f932b523b9b50b398a30e448f45d0531a6f632c42b695c2e35da95b56dfd61a8619912cb05ad9169eca7300f8a260bb16d759
-
SSDEEP
3072:GoXdRBpni91jQoPH7I5esRHROhz85hEypUiQ+5WMHd85EVmgUkwn7:GAjiDQoPHc5TxRgChEOPRWM2K9Up
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2585d60532494d5cb898b4c99ae6bfba_JaffaCakes118
Files
-
2585d60532494d5cb898b4c99ae6bfba_JaffaCakes118.exe windows:4 windows x86 arch:x86
14029602101d66b39c42dd561b185cf6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoCreateInstance
DoDragDrop
OleRun
gdi32
SetPixelV
GetTextExtentPoint32W
Rectangle
GetBkColor
CreateDIBSection
gdiplus
GdipCreateHBITMAPFromBitmap
GdipCloneImage
comctl32
ImageList_Destroy
PropertySheetW
ImageList_AddMasked
InitCommonControlsEx
_TrackMouseEvent
ImageList_GetIcon
ImageList_Add
ImageList_LoadImageW
ImageList_GetImageCount
ImageList_ReplaceIcon
ImageList_GetImageInfo
ImageList_Draw
kernel32
GetVersionExA
GlobalFree
GetLastError
ReplaceFileW
lstrcpyW
InterlockedDecrement
GetModuleFileNameW
GetFileAttributesW
FindClose
LoadLibraryW
LoadLibraryA
lstrlenW
InterlockedIncrement
LoadResource
GetProcAddress
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleHandleW
SetFileAttributesW
FindCloseChangeNotification
GetProcessId
LoadLibraryExW
GetVersion
GetCurrentDirectoryW
InterlockedExchange
WritePrivateProfileStringW
GlobalSize
GlobalLock
CreateThread
GetLocaleInfoW
ResumeThread
EnumResourceTypesA
Sleep
DeleteCriticalSection
GetThreadLocale
FreeLibrary
MultiByteToWideChar
GlobalAlloc
WaitForSingleObject
lstrcmpW
InitializeCriticalSection
ExitProcess
FindResourceW
QueryPerformanceCounter
GetACP
LocalFree
LockResource
GetSystemTimeAsFileTime
FileTimeToSystemTime
SetThreadPriority
FileTimeToLocalFileTime
WideCharToMultiByte
DeleteFileW
GlobalUnlock
CloseHandle
FindFirstFileW
GetCurrentThreadId
lstrcpynW
FindFirstChangeNotificationW
GetTickCount
MulDiv
GetVersionExW
FindNextChangeNotification
GetCurrentProcessId
shell32
DragAcceptFiles
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetDesktopFolder
SHGetSpecialFolderLocation
ShellExecuteW
SHAppBarMessage
SHGetFileInfoW
ShellExecuteExW
SHGetMalloc
Shell_NotifyIconW
advapi32
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyW
RegQueryValueExW
RegEnumKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumValueW
RegCloseKey
user32
DeleteMenu
WindowFromPoint
PostMessageW
DrawAnimatedRects
FindWindowW
GetSysColor
GetKeyState
GetDCEx
AppendMenuW
GetClientRect
ReleaseCapture
DrawFocusRect
KillTimer
GetParent
SetFocus
MessageBeep
EnableWindow
IsClipboardFormatAvailable
SetCaretPos
CreateIconIndirect
GetKeyboardLayout
RegisterWindowMessageW
FillRect
SetTimer
LoadBitmapW
MapVirtualKeyW
SetParent
GetMenuItemID
SetScrollPos
DestroyCursor
DragDetect
SetWindowsHookExW
IntersectRect
CheckMenuItem
GetMenuDefaultItem
CloseClipboard
GetSysColorBrush
wsprintfW
GetMessagePos
GetWindow
CallNextHookEx
InsertMenuW
OffsetRect
GetMenu
CallWindowProcW
EnumChildWindows
GetFocus
DispatchMessageW
GetMenuItemInfoW
EmptyClipboard
EnableScrollBar
ShowCaret
GetWindowPlacement
DeferWindowPos
CreatePopupMenu
IsMenu
CloseWindow
LoadImageW
GetWindowTextW
GetKeyNameTextW
GetMessageW
ShowWindow
GetCapture
SetMenuDefaultItem
GetWindowRect
UnhookWindowsHookEx
IsZoomed
SendMessageW
GetScrollInfo
UpdateWindow
MoveWindow
mouse_event
TabbedTextOutW
DrawIconEx
SetRect
DrawTextExW
GetSystemMetrics
InflateRect
SystemParametersInfoA
GrayStringW
DrawEdge
DestroyWindow
SetWindowLongW
DrawIcon
GetDesktopWindow
DrawFrameControl
GetSystemMenu
GetDlgCtrlID
GetActiveWindow
CopyIcon
SetMenu
OpenClipboard
SetClipboardData
LoadCursorW
DestroyCaret
ScreenToClient
BeginDeferWindowPos
DestroyAcceleratorTable
GetClassLongW
GetDC
DrawTextW
GetMenuState
IsWindow
SetCursor
GetNextDlgTabItem
ReleaseDC
PtInRect
CreateAcceleratorTableW
InvalidateRect
RedrawWindow
GetMenuItemCount
ClientToScreen
IsIconic
IsCharLowerW
EnableMenuItem
EndDeferWindowPos
TranslateMessage
LockWindowUpdate
GetClipboardData
GetIconInfo
MapWindowPoints
ShowScrollBar
SetForegroundWindow
SetWindowPos
CopyRect
CreateCaret
TrackPopupMenu
GetLastActivePopup
DrawStateW
CopyAcceleratorTableW
LoadMenuW
GetForegroundWindow
MapVirtualKeyExW
IsWindowVisible
SetRectEmpty
PeekMessageW
BringWindowToTop
DestroyIcon
LoadIconW
SetWindowRgn
GetDlgItem
IsChild
RegisterClipboardFormatW
GetScrollPos
GetClassNameW
SetCapture
SystemParametersInfoW
SetCursorPos
SetActiveWindow
GetTabbedTextExtentW
UnionRect
SetScrollInfo
GetSubMenu
GetWindowLongW
HideCaret
EqualRect
GetCursorPos
IsRectEmpty
GetCursor
DestroyMenu
Sections
.text Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ