Static task
static1
Behavioral task
behavioral1
Sample
29ec5c75639d967beeed31b0a4b0bc18_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
29ec5c75639d967beeed31b0a4b0bc18_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
29ec5c75639d967beeed31b0a4b0bc18_JaffaCakes118
-
Size
66KB
-
MD5
29ec5c75639d967beeed31b0a4b0bc18
-
SHA1
73e501a8ccca417c70de9c2c427d04074fac8e32
-
SHA256
e60a164af9731e05128b660232ba970c828e54c6a42b96233d0bf05f142da7db
-
SHA512
270b5aa3a78da42cd54175122612fbeab0e0f0ba343b08997831436e25a8171229d12af215e6d4a5eaa80f1bf9a54c2d98cef95e3fc9e860cff80297625da9e2
-
SSDEEP
768:5o7GO+bEyvFReou1t2O8IHDUb2OAIw9/L7FwNQU1lGSolPr53LXN3LSC08aUb:qaO+qtL8ontqaSej57XN7iUb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 29ec5c75639d967beeed31b0a4b0bc18_JaffaCakes118
Files
-
29ec5c75639d967beeed31b0a4b0bc18_JaffaCakes118.exe windows:4 windows x86 arch:x86
44186248df7072987ef45d6bebc2e1f8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMenu
UpdateWindow
SendMessageW
SetParent
LoadIconA
CharLowerA
ClientToScreen
GetWindowThreadProcessId
DefWindowProcA
CheckMenuItem
IsIconic
GetSystemMenu
UnhookWindowsHookEx
GetScrollInfo
SendMessageA
RedrawWindow
InsertMenuItemA
TranslateMDISysAccel
IsDialogMessageW
LoadBitmapA
CallNextHookEx
GetMessagePos
SetForegroundWindow
SetClipboardData
GetTopWindow
SetFocus
GetKeyboardLayoutList
DefFrameProcA
IsChild
DispatchMessageW
IsWindowEnabled
SetTimer
GetDlgItem
GetKeyboardType
IsWindowUnicode
DrawFrameControl
DrawAnimatedRects
SetScrollRange
InflateRect
GetIconInfo
ChildWindowFromPoint
EqualRect
GetClientRect
SetWindowPlacement
AdjustWindowRectEx
GetKeyState
IsDialogMessageA
PeekMessageA
EmptyClipboard
GetDCEx
GetMenuItemInfoA
ScrollWindow
SetClassLongA
IntersectRect
ActivateKeyboardLayout
PostMessageA
GetActiveWindow
IsZoomed
TrackPopupMenu
DestroyMenu
GetMenuStringA
KillTimer
MessageBeep
SetCursor
DrawEdge
GetKeyboardLayout
ShowOwnedPopups
GetKeyboardState
WaitMessage
MapVirtualKeyA
GetParent
GetCursor
GetKeyNameTextA
CloseClipboard
DestroyIcon
CallWindowProcA
CharLowerBuffA
SetRect
OffsetRect
GetDesktopWindow
GetFocus
ShowWindow
OemToCharA
LoadStringA
GetWindowLongA
RemoveMenu
MoveWindow
DrawIconEx
GetSysColor
GetWindow
GetCapture
SetWindowTextA
CharNextA
OpenClipboard
DestroyWindow
DrawMenuBar
ReleaseDC
GetDC
SetWindowLongW
MapWindowPoints
GetWindowPlacement
ReleaseCapture
GetMenuState
RegisterClassA
GetMenuItemCount
DeleteMenu
ShowScrollBar
DrawIcon
GetWindowDC
PostQuitMessage
IsWindowVisible
EnableWindow
EnableScrollBar
InsertMenuA
EnumWindows
EnumThreadWindows
SetCapture
EnumChildWindows
SetPropA
IsRectEmpty
GetClassInfoA
DestroyCursor
FrameRect
UnregisterClassA
LoadCursorA
MessageBoxA
SetActiveWindow
FindWindowA
PtInRect
GetScrollRange
GetWindowTextA
CharNextW
TranslateMessage
GetKeyboardLayoutNameA
GetPropA
GetForegroundWindow
GetClassNameA
GetCursorPos
CharToOemA
CreateWindowExA
SetWindowsHookExA
GetWindowRect
SetWindowLongA
PeekMessageW
DrawTextA
WindowFromPoint
SetScrollPos
GetLastActivePopup
RemovePropA
SetWindowPos
ScreenToClient
SystemParametersInfoA
MsgWaitForMultipleObjects
CreateIcon
SetMenuItemInfoA
GetClassLongA
GetMenuItemID
CreatePopupMenu
wsprintfA
RegisterWindowMessageA
GetWindowLongW
GetScrollPos
GetSubMenu
LoadKeyboardLayoutA
IsWindow
InvalidateRect
CharUpperBuffA
GetClipboardData
GetSystemMetrics
DefMDIChildProcA
EndPaint
kernel32
GetCommandLineA
WideCharToMultiByte
LoadLibraryExA
GetSystemDefaultLangID
GetThreadLocale
CreateFileA
ResetEvent
CompareStringA
GetLocalTime
SetThreadLocale
HeapFree
GetStdHandle
MoveFileExA
FindResourceA
SetEndOfFile
lstrlenA
HeapDestroy
VirtualAllocEx
SetFilePointer
GetUserDefaultLCID
GetFileAttributesA
EnumCalendarInfoA
EnterCriticalSection
GetFileSize
GetFileType
GetStartupInfoA
DeleteCriticalSection
lstrcpyA
GetTickCount
GetModuleFileNameA
GetLastError
FormatMessageA
WaitForSingleObject
GetVersionExA
GetCurrentThread
GetCurrentProcessId
LockResource
CreateThread
GetFullPathNameA
GetDiskFreeSpaceA
MulDiv
LocalAlloc
GetModuleHandleA
GetACP
lstrcatA
GetOEMCP
ExitThread
GetCurrentProcess
GetCurrentThreadId
SetErrorMode
SetEvent
GlobalAddAtomA
DeleteFileA
FreeLibrary
GetStringTypeW
LoadLibraryA
InitializeCriticalSection
FindClose
RaiseException
ExitProcess
GetProcAddress
CreateEventA
GlobalDeleteAtom
Sleep
SetLastError
FindFirstFileA
LocalReAlloc
GlobalFindAtomA
ReadFile
FreeResource
GlobalAlloc
SizeofResource
LocalFree
GetProcessHeap
GetStringTypeA
VirtualAlloc
GetVersion
GetCPInfo
lstrcmpiA
GetDateFormatA
VirtualQuery
lstrcmpA
lstrcpynA
CloseHandle
VirtualFree
msvcrt
memcpy
log10
calloc
acos
abs
memmove
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE