Static task
static1
Behavioral task
behavioral1
Sample
307ecfe26bc55853f28b663d076b1017_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
307ecfe26bc55853f28b663d076b1017_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
307ecfe26bc55853f28b663d076b1017_JaffaCakes118
-
Size
112KB
-
MD5
307ecfe26bc55853f28b663d076b1017
-
SHA1
02af7da68616f5b02904b7f196942abcc38d331b
-
SHA256
c18dec08dd6359b4fb15e942ed5a264832c9b5210ee546745dd6a0671e883f6f
-
SHA512
48fb6b19a3125e14a1dfa4500427314aa2d834572a8282038bec2ad6abf1cb7c31a18de3a1c5eed5c8b7aec7c6342fa2804c6baefd4293705be47f797bd2666b
-
SSDEEP
3072:AgkPKZAzwhAg0vg0drfnkA8nY2qrhrXV:AgByzwhv0NkAOY2Ql
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 307ecfe26bc55853f28b663d076b1017_JaffaCakes118
Files
-
307ecfe26bc55853f28b663d076b1017_JaffaCakes118.exe windows:4 windows x86 arch:x86
290c741ae42a1fa949b15ef355f8e291
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
DragQueryFileA
SHGetFileInfoA
SHGetFolderPathA
SHGetSpecialFolderLocation
SHFileOperationA
gdi32
CopyEnhMetaFileA
GetObjectA
SetBkMode
GetBitmapBits
SelectPalette
kernel32
FreeResource
GetACP
GetVersion
GetStringTypeW
FormatMessageA
lstrcmpA
ExitThread
HeapDestroy
EnterCriticalSection
GetModuleHandleA
VirtualFree
FindResourceA
GetOEMCP
CreateFileA
SetHandleCount
HeapAlloc
GetFileSize
GetCurrentProcess
SetEvent
InitializeCriticalSection
CreateEventA
MoveFileExA
GetLocaleInfoA
LoadResource
CompareStringA
GetCPInfo
GlobalFindAtomA
FindFirstFileA
GetFileAttributesA
ResetEvent
GetTickCount
GetDateFormatA
FreeLibrary
ExitProcess
MulDiv
LoadLibraryExA
GetEnvironmentStrings
lstrcpyA
DeleteCriticalSection
SetErrorMode
HeapFree
Sleep
VirtualAlloc
WideCharToMultiByte
lstrcatA
GlobalAlloc
GetCurrentThreadId
MoveFileA
LocalReAlloc
LockResource
SizeofResource
FindClose
lstrcpynA
GetSystemDefaultLangID
GetStringTypeA
SetEndOfFile
GetCurrentThread
LoadLibraryA
CloseHandle
GetVersionExA
GetLastError
GetFullPathNameA
lstrlenA
GetFileType
GetStartupInfoA
GlobalAddAtomA
GetDiskFreeSpaceA
DeleteFileA
VirtualQuery
GetLocalTime
GetModuleFileNameA
GetStdHandle
GetProcessHeap
GetCommandLineA
SetThreadLocale
EnumCalendarInfoA
GetProcAddress
GetThreadLocale
GetCurrentProcessId
lstrcmpiA
SetFilePointer
VirtualAllocEx
GetUserDefaultLCID
LocalFree
LocalAlloc
WriteFile
RaiseException
WaitForSingleObject
CreateThread
SetLastError
msvcrt
memmove
log
time
sprintf
memcpy
cos
calloc
advapi32
GetUserNameA
user32
CallNextHookEx
CallWindowProcA
LoadBitmapA
WaitMessage
DrawTextA
WindowFromPoint
SetParent
GetForegroundWindow
GetDC
GetKeyboardLayout
DrawAnimatedRects
GetWindowThreadProcessId
GetSystemMetrics
EnumChildWindows
CharUpperBuffA
GetClassNameA
OffsetRect
GetKeyState
GetDCEx
FindWindowA
PostQuitMessage
GetMenuItemInfoA
MapVirtualKeyA
InflateRect
DrawIcon
CloseClipboard
DefWindowProcA
IntersectRect
DrawIconEx
IsZoomed
MessageBeep
FillRect
GetKeyboardLayoutNameA
GetKeyboardType
DefFrameProcA
SetScrollRange
ActivateKeyboardLayout
EnableWindow
InvalidateRect
DestroyIcon
SendMessageW
SetActiveWindow
SetWindowPos
SetFocus
RedrawWindow
UnhookWindowsHookEx
IsDialogMessageA
LoadCursorA
LoadStringA
ShowOwnedPopups
UpdateWindow
GetPropA
FrameRect
SetPropA
GetMenuStringA
SetRect
EnableMenuItem
SetWindowTextA
GetActiveWindow
SetWindowPlacement
SetMenu
SetClassLongA
GetCursor
GetClassLongA
ChildWindowFromPoint
SetClipboardData
GetWindowLongA
CharNextA
IsChild
DispatchMessageW
DrawEdge
MapWindowPoints
InsertMenuA
GetWindowLongW
CheckMenuItem
SetTimer
AdjustWindowRectEx
GetClassInfoA
ReleaseCapture
CreateIcon
PostMessageA
GetMessagePos
DestroyMenu
wsprintfA
GetTopWindow
GetClientRect
RemovePropA
GetParent
GetMenu
GetScrollInfo
IsDialogMessageW
ShowWindow
GetSubMenu
GetKeyboardState
IsWindowEnabled
TrackPopupMenu
GetMenuItemID
SetCursor
GetDlgItem
SetWindowLongW
CharNextW
GetDesktopWindow
GetWindowPlacement
IsWindow
GetWindow
DeleteMenu
EmptyClipboard
EnumThreadWindows
GetFocus
CharLowerA
KillTimer
GetLastActivePopup
TranslateMDISysAccel
SetScrollInfo
SetScrollPos
CharToOemA
ShowScrollBar
EqualRect
CreateWindowExA
SetCapture
GetClipboardData
DefMDIChildProcA
ReleaseDC
EnableScrollBar
GetWindowDC
GetKeyNameTextA
RegisterWindowMessageA
PeekMessageA
UnregisterClassA
MsgWaitForMultipleObjects
GetWindowRect
RegisterClassA
ScreenToClient
GetMenuState
DispatchMessageA
OpenClipboard
EndPaint
TranslateMessage
GetSysColorBrush
GetSystemMenu
ClientToScreen
SendMessageA
GetScrollPos
GetScrollRange
IsWindowVisible
SetForegroundWindow
IsRectEmpty
IsIconic
SetMenuItemInfoA
SystemParametersInfoA
GetKeyboardLayoutList
GetSysColor
CreateMenu
LoadKeyboardLayoutA
BeginPaint
DestroyWindow
CreatePopupMenu
GetCapture
GetWindowTextA
SetWindowLongA
GetIconInfo
DestroyCursor
ScrollWindow
OemToCharA
SetWindowsHookExA
DrawFrameControl
EnumWindows
PtInRect
RemoveMenu
DrawMenuBar
MessageBoxA
GetMenuItemCount
MoveWindow
shlwapi
SHDeleteValueA
PathIsDirectoryA
PathGetCharTypeA
SHGetValueA
SHEnumValueA
oleaut32
SafeArrayCreate
SysStringLen
VariantCopyInd
SysReAllocStringLen
VariantChangeType
SafeArrayGetElement
SafeArrayPtrOfIndex
SafeArrayGetUBound
comctl32
ImageList_Write
ImageList_DrawEx
Sections
CODE Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE