Static task
static1
Behavioral task
behavioral1
Sample
2e38915c8380aeecfaa29100c53cfe0f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2e38915c8380aeecfaa29100c53cfe0f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2e38915c8380aeecfaa29100c53cfe0f_JaffaCakes118
-
Size
114KB
-
MD5
2e38915c8380aeecfaa29100c53cfe0f
-
SHA1
03d7df8227cf09d218af2be161c4aae43bfeee05
-
SHA256
e8757eeca94f860523aa00f9646ac639005b74e5c3ac35961135b5d76c507619
-
SHA512
3bc3c5bbfea39676ad1a35019c02a18df9aabbdf408f9a892f0a74954c0ed746cbef879c2d7855ad4b303598a25c3305859afc4ae391999741cfa4ba56381754
-
SSDEEP
3072:kce+P8iSNmBoqIeJvB15FwEdVoepS1TT:7H7um3HJvsSjA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e38915c8380aeecfaa29100c53cfe0f_JaffaCakes118
Files
-
2e38915c8380aeecfaa29100c53cfe0f_JaffaCakes118.exe windows:4 windows x86 arch:x86
009c2365e8cb30d4b7acce8dd7eee9cb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetSaveFileNameA
FindTextA
GetOpenFileNameA
GetFileTitleA
ChooseColorA
shell32
Shell_NotifyIconA
comctl32
ImageList_Write
ImageList_Create
msvcrt
pow
memmove
strcmp
oleaut32
GetErrorInfo
RegisterTypeLib
SysStringLen
SafeArrayUnaccessData
SysFreeString
OleLoadPicture
SysReAllocStringLen
SafeArrayGetUBound
user32
TrackPopupMenu
SetActiveWindow
PtInRect
GetWindowTextA
CharUpperBuffA
GetSysColorBrush
PostMessageA
IsWindowEnabled
GetClassInfoA
SystemParametersInfoA
GetScrollPos
IntersectRect
GetCapture
SetWindowsHookExA
ShowOwnedPopups
UnregisterClassA
EnableMenuItem
KillTimer
DestroyWindow
DefMDIChildProcA
ChildWindowFromPoint
PostQuitMessage
GetWindowLongW
DrawEdge
SetWindowTextA
SetCapture
CallWindowProcA
GetCursor
InsertMenuA
GetMenuStringA
DrawAnimatedRects
GetDC
ShowScrollBar
MapVirtualKeyA
GetClipboardData
SetFocus
CloseClipboard
GetKeyboardLayout
GetKeyState
InvalidateRect
GetDlgItem
OemToCharA
FindWindowA
DispatchMessageW
LoadKeyboardLayoutA
IsWindowUnicode
EnableWindow
GetDCEx
GetMenuItemInfoA
DrawFrameControl
RemoveMenu
CharLowerBuffA
IsWindow
SetClipboardData
GetSysColor
DrawIconEx
GetKeyboardState
IsIconic
GetWindowPlacement
GetLastActivePopup
GetMenuState
ClientToScreen
IsRectEmpty
GetKeyNameTextA
EndPaint
SetWindowLongA
LoadCursorA
LoadIconA
SetWindowPos
LoadBitmapA
SendMessageW
GetTopWindow
GetSystemMetrics
CharLowerA
GetKeyboardType
GetSystemMenu
AdjustWindowRectEx
DrawTextA
SetScrollInfo
DestroyCursor
wsprintfA
GetMenuItemID
GetFocus
GetWindowLongA
WaitMessage
CheckMenuItem
GetWindowDC
RemovePropA
RegisterClipboardFormatA
DefWindowProcA
DrawMenuBar
OffsetRect
DestroyIcon
SetPropA
EqualRect
ShowWindow
RegisterWindowMessageA
SetWindowPlacement
MoveWindow
SetCursor
SetMenuItemInfoA
IsChild
IsWindowVisible
GetPropA
SetRect
SetScrollRange
CreateMenu
SetParent
EnumThreadWindows
SetTimer
TranslateMessage
EnumChildWindows
GetScrollInfo
UnhookWindowsHookEx
SetMenu
GetMenu
ScrollWindow
DrawIcon
GetWindowThreadProcessId
SetForegroundWindow
IsZoomed
EmptyClipboard
GetIconInfo
LoadStringA
MapWindowPoints
IsDialogMessageW
IsDialogMessageA
SetScrollPos
GetWindowRect
OpenClipboard
FillRect
GetMessagePos
MessageBeep
GetSubMenu
InflateRect
GetClassNameA
DestroyMenu
CallNextHookEx
DispatchMessageA
DefFrameProcA
EnableScrollBar
BeginPaint
CharNextA
GetForegroundWindow
SetWindowLongW
GetKeyboardLayoutNameA
SendMessageA
CreateWindowExA
GetClassLongA
ScreenToClient
RegisterClassA
InsertMenuItemA
CharNextW
MessageBoxA
GetScrollRange
TranslateMDISysAccel
GetClientRect
GetActiveWindow
RedrawWindow
shlwapi
PathIsContentTypeA
SHStrDupA
PathFileExistsA
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
SHQueryInfoKeyA
SHQueryValueExA
ole32
StgCreateDocfileOnILockBytes
CreateBindCtx
WriteClassStm
GetHGlobalFromStream
CoUnmarshalInterface
StringFromIID
PropVariantClear
version
GetFileVersionInfoSizeA
kernel32
GetModuleHandleA
LoadLibraryA
ExitProcess
GetVersionExA
FreeResource
VirtualAllocEx
ExitThread
HeapDestroy
LoadLibraryExA
lstrlenA
Sections
CODE Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 579B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE