Static task
static1
Behavioral task
behavioral1
Sample
2c4015680fb8c170b048663041c7d4ad_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2c4015680fb8c170b048663041c7d4ad_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2c4015680fb8c170b048663041c7d4ad_JaffaCakes118
-
Size
2.0MB
-
MD5
2c4015680fb8c170b048663041c7d4ad
-
SHA1
8e82b169097678838c5b71f55398887ec502f7a4
-
SHA256
b727d94c4bd5892b0b2d0f7c70c32c801f50f3f0b534af51777f696082721272
-
SHA512
23b9f8fc1460ad3f31cc8618c9a1e53a6c42717e98a62c067d4d6699ee8b264e0240d6e0c80d7ea44b8b39078ad93a5448ff3c7f0c9a696a6cb0660833e90154
-
SSDEEP
24576:ZE5OoJBQB6NNVc7X6j6xzJ9bsUTdOEr+oTmLZfkGSJ7Y201G/au7SgDhrN4:ZE8izuBsi11cZsGcCn5gDhr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c4015680fb8c170b048663041c7d4ad_JaffaCakes118
Files
-
2c4015680fb8c170b048663041c7d4ad_JaffaCakes118.exe windows:4 windows x86 arch:x86
63e15eadab100735139054cdf30eb0f7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_LoadImageA
ord17
winmm
PlaySoundA
kernel32
GlobalAddAtomA
GlobalFindAtomA
GetTempFileNameA
GetModuleFileNameA
GlobalAlloc
GlobalFree
OutputDebugStringA
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
GlobalSize
LocalFree
LocalAlloc
lstrlenA
CompareStringA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
HeapSize
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetConsoleMode
GetConsoleCP
InitializeCriticalSection
Sleep
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetHandleCount
GlobalDeleteAtom
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
RaiseException
LCMapStringW
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetStdHandle
VirtualAlloc
DeleteCriticalSection
VirtualFree
HeapCreate
HeapDestroy
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
RtlUnwind
LeaveCriticalSection
EnterCriticalSection
GetStartupInfoA
GetProcessHeap
GetCommandLineA
GetSystemTimeAsFileTime
HeapReAlloc
HeapAlloc
HeapFree
GetLastError
GetExitCodeThread
WaitForSingleObject
MoveFileA
RemoveDirectoryA
FlushFileBuffers
GetVersionExA
GetProcAddress
GetModuleHandleA
SetThreadExecutionState
LockResource
SizeofResource
LoadResource
FindResourceA
DeleteFileA
CloseHandle
GlobalUnlock
ReadFile
WriteFile
GetWindowsDirectoryA
GetTickCount
GlobalLock
SetEndOfFile
SetFilePointer
GetFileSize
ExitProcess
CreateFileA
CreateDirectoryA
FindNextFileA
GetPrivateProfileStructA
WritePrivateProfileStringA
GetPrivateProfileStringA
FindClose
FindFirstFileA
SetThreadPriority
GetCurrentThread
WritePrivateProfileStructA
CreateThread
LoadLibraryA
FreeLibrary
CompareStringW
SetEnvironmentVariableA
GetEnvironmentStringsW
user32
SetWindowPlacement
GetMessageA
InvertRect
SetActiveWindow
SetScrollRange
IsDialogMessageA
SetScrollPos
ChangeClipboardChain
LoadAcceleratorsA
EnableScrollBar
GetMenuItemCount
InsertMenuA
SetClipboardViewer
TranslateMessage
PeekMessageA
SetClipboardData
DispatchMessageA
DrawTextA
GetCursor
MoveWindow
DialogBoxParamA
LoadCursorA
ReleaseCapture
GetCursorPos
GetSysColor
EndDialog
GetDlgItem
SetClassLongA
GetWindowPlacement
EndPaint
FillRect
BeginPaint
OffsetRect
SetRect
DefWindowProcA
EmptyClipboard
wvsprintfA
wsprintfA
TranslateAcceleratorA
InvalidateRect
PtInRect
SetCapture
LoadImageA
RegisterClassA
GetDlgItemInt
SetDlgItemInt
IsIconic
EnableMenuItem
GetMenuState
GetMenuStringA
SystemParametersInfoA
CloseClipboard
PostQuitMessage
IsClipboardFormatAvailable
GetClientRect
GetClipboardData
SetWindowPos
OpenClipboard
ScreenToClient
FindWindowExA
SetParent
SetWindowLongA
CreateWindowExA
CallWindowProcA
TrackPopupMenu
GetSubMenu
GetFocus
GetParent
LoadMenuA
GetDC
ReleaseDC
AppendMenuA
FlashWindow
GetSystemMetrics
CloseWindow
DestroyMenu
DestroyWindow
CreateDialogParamA
KillTimer
LoadStringA
LoadIconA
SetFocus
GetWindowTextLengthA
SendMessageA
GetWindowTextA
MessageBoxA
GetDesktopWindow
CheckDlgButton
ShowWindow
IsDlgButtonChecked
PostMessageA
SetWindowTextA
EnableWindow
GetDlgItemTextA
SetDlgItemTextA
SetCursor
SetTimer
GetWindowRect
SendDlgItemMessageA
RemoveMenu
gdi32
GetStockObject
CreateSolidBrush
CreateDIBSection
AbortDoc
EndDoc
SetROP2
SetStretchBltMode
StartDocA
SetMapMode
CreateCompatibleDC
SetBkMode
SetPixel
CreateDCA
GetObjectA
GetDeviceCaps
DeleteDC
StartPage
EndPage
BitBlt
TextOutA
ExtSelectClipRgn
CreatePen
CreateRectRgn
SetDIBits
Rectangle
CreateRectRgnIndirect
SelectClipRgn
ExcludeClipRect
SelectObject
DeleteObject
SetBkColor
CreateFontIndirectA
SetTextColor
LPtoDP
StretchBlt
GetTextExtentPoint32A
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
EnumPrintersA
comdlg32
GetOpenFileNameA
CommDlgExtendedError
GetSaveFileNameA
advapi32
RegQueryValueExA
RegCreateKeyA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
RegSetValueExA
shell32
SHGetMalloc
SHBrowseForFolderA
ShellExecuteA
SHGetPathFromIDListA
ole32
OleGetClipboard
OleInitialize
Sections
.text Size: 628KB - Virtual size: 624KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 196KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 244KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1004KB - Virtual size: 1001KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ