Static task
static1
Behavioral task
behavioral1
Sample
2d172ad5b9c8e9772070ae10e72d2b97_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2d172ad5b9c8e9772070ae10e72d2b97_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2d172ad5b9c8e9772070ae10e72d2b97_JaffaCakes118
-
Size
166KB
-
MD5
2d172ad5b9c8e9772070ae10e72d2b97
-
SHA1
a476a239b1016d0f0623a3602b69fbdf3c0ddd27
-
SHA256
f6a9ea6511251b2762ecb4a3af17b0e1f771d1fab289d921b5f519045031b38d
-
SHA512
070aaf475fb9b2bdb47fa3af29bf5d1a7d6f5cbaa5f861676b1606282d063ea2934046a1b8bc06cd3bc751530313dc403868f4ef156b7e3445ad5ab931988a57
-
SSDEEP
3072:1QtMQLkR+Qtqstruh7lvfpGACE1kICWx5lcUgpyiVGAfzXfT//qvJ:0MdPFWnGAfjeYiVZrXfr/qx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d172ad5b9c8e9772070ae10e72d2b97_JaffaCakes118
Files
-
2d172ad5b9c8e9772070ae10e72d2b97_JaffaCakes118.exe windows:4 windows x86 arch:x86
a71123f21beca0ebf7151e4aba55f675
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetDesktopFolder
Shell_NotifyIconA
SHGetFolderPathA
SHGetSpecialFolderLocation
comdlg32
ChooseColorA
GetSaveFileNameA
GetFileTitleA
ole32
CoGetContextToken
CoCreateFreeThreadedMarshaler
CLSIDFromProgID
StringFromIID
CoUninitialize
PropVariantClear
CoCreateInstanceEx
CoCreateInstanceEx
CoUninitialize
MkParseDisplayName
CoCreateGuid
CoReleaseMarshalData
StringFromIID
CoRevokeClassObject
StgCreateDocfileOnILockBytes
CoRevokeClassObject
CreateOleAdviseHolder
CoUninitialize
CreateBindCtx
StgOpenStorage
CreateStreamOnHGlobal
ReleaseStgMedium
CoGetObjectContext
MkParseDisplayName
OleCreateStaticFromData
CreateBindCtx
CoRevokeClassObject
CoRegisterClassObject
oleaut32
SysReAllocStringLen
SafeArrayGetUBound
GetErrorInfo
VariantCopyInd
SysFreeString
RegisterTypeLib
OleLoadPicture
SafeArrayUnaccessData
SafeArrayGetElement
kernel32
FindFirstFileA
VirtualAlloc
GetStringTypeW
LoadLibraryA
GetModuleHandleA
LocalReAlloc
GetVersionExA
GetStartupInfoA
ExitThread
SetFilePointer
ExitProcess
GetProcAddress
LoadLibraryA
GetProcAddress
MulDiv
InitializeCriticalSection
GetDateFormatA
GetUserDefaultLCID
FindResourceA
LocalFree
GetStringTypeA
GetDiskFreeSpaceA
GetFileAttributesA
GetCPInfo
gdi32
SetTextColor
GetObjectA
GetRgnBox
CreateBrushIndirect
GetDIBits
BitBlt
advapi32
RegEnumKeyExA
RegEnumValueA
user32
RegisterClipboardFormatA
IsDialogMessageW
DefWindowProcA
CallWindowProcA
RedrawWindow
IsIconic
ChildWindowFromPoint
DrawIconEx
ShowScrollBar
SetPropA
PeekMessageA
SetWindowLongA
SetCapture
SetScrollRange
GetWindowTextA
CheckMenuItem
PtInRect
CharUpperBuffA
GetSystemMetrics
GetCursorPos
SetWindowTextA
OemToCharA
SetFocus
GetSubMenu
MapWindowPoints
GetClientRect
SetScrollPos
TranslateMessage
TrackPopupMenu
PeekMessageW
GetWindow
GetFocus
MsgWaitForMultipleObjects
GetMenuState
SetClipboardData
IsWindowUnicode
SendMessageA
GetMenuItemID
BeginPaint
GetKeyboardLayoutNameA
GetMessagePos
LoadCursorA
SetScrollInfo
DestroyIcon
wsprintfA
CloseClipboard
EqualRect
FillRect
SetForegroundWindow
IsWindowVisible
IsChild
DrawTextA
CharLowerA
GetWindowPlacement
SetMenuItemInfoA
InflateRect
LoadIconA
DrawEdge
IsRectEmpty
RemovePropA
CreateMenu
IsWindowEnabled
SetWindowPlacement
GetScrollInfo
OpenClipboard
ScreenToClient
TranslateMDISysAccel
GetClassNameA
GetDesktopWindow
GetDlgItem
ShowWindow
CharNextW
IsDialogMessageA
FindWindowA
WaitMessage
CreatePopupMenu
EnumWindows
UnregisterClassA
SetWindowsHookExA
SetWindowPos
InsertMenuItemA
GetMenuStringA
GetCapture
InvalidateRect
GetKeyboardLayout
DefFrameProcA
IsZoomed
SetRect
DrawAnimatedRects
CharToOemA
GetPropA
CharNextA
LoadStringA
GetKeyNameTextA
GetParent
GetClipboardData
GetMenu
DeleteMenu
SetTimer
DefMDIChildProcA
ShowOwnedPopups
PostQuitMessage
MapVirtualKeyA
GetDC
CreateIcon
GetCursor
DrawIcon
ScrollWindow
GetClassInfoA
EnableWindow
DrawMenuBar
GetWindowLongA
SetClassLongA
GetActiveWindow
msvcrt
clock
strncmp
pow
malloc
log
srand
log10
memmove
shlwapi
PathIsContentTypeA
SHStrDupA
SHQueryInfoKeyA
PathGetCharTypeA
PathFileExistsA
SHGetValueA
SHSetValueA
SHEnumValueA
comctl32
ImageList_Write
ImageList_Create
ImageList_GetBkColor
ImageList_Read
ImageList_Remove
ImageList_Add
version
VerQueryValueA
VerInstallFileA
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ