Static task
static1
Behavioral task
behavioral1
Sample
37a202b643ae3da880830c6e5ac019ab_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
37a202b643ae3da880830c6e5ac019ab_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
37a202b643ae3da880830c6e5ac019ab_JaffaCakes118
-
Size
170KB
-
MD5
37a202b643ae3da880830c6e5ac019ab
-
SHA1
8bde76882603739df73f3d515260936ffada9646
-
SHA256
6cbd5376ee96d47fb1c9c0039f4ccea36195c588dec087c5a0fef8c9239490a6
-
SHA512
31bd090abc750a57f65d687b8043a83516a1818cf835845970c16f57847dd77b6f03c06ec55153c25c1fd3de159c0bd093cdfa09a3d29525c429584d5a1e6f78
-
SSDEEP
3072:c6IDKt++85Be8WylH2aA5gYt9NbEmAJHYKcMtNzB7ODzcwC+:c5KD85B1WCY2mAJ4fMJ7mc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37a202b643ae3da880830c6e5ac019ab_JaffaCakes118
Files
-
37a202b643ae3da880830c6e5ac019ab_JaffaCakes118.exe windows:1 windows x86 arch:x86
39cb00cc0d99b6718755e013aa71df47
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetStdHandle
VirtualAlloc
IsBadCodePtr
VirtualFree
TlsSetValue
EnterCriticalSection
LeaveCriticalSection
GlobalFree
GlobalDeleteAtom
GetFileType
LoadLibraryA
GetModuleFileNameA
UnhandledExceptionFilter
TlsFree
ExitProcess
GetACP
GetCPInfo
GetOEMCP
RaiseException
GetEnvironmentStrings
GetCommandLineA
GlobalAlloc
GetStartupInfoA
RtlUnwind
GetFullPathNameA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetVolumeInformationA
DeleteFileA
LockFile
SetEndOfFile
UnlockFile
WriteFile
FlushFileBuffers
SetFilePointer
DuplicateHandle
ReadFile
GetCurrentProcess
GetProcAddress
DeleteCriticalSection
InitializeCriticalSection
GetModuleHandleA
WritePrivateProfileStringA
GetVersion
TlsAlloc
FindResourceA
lstrcmpA
lstrcmpiA
LocalAlloc
SetLastError
LocalFree
lstrcpyA
TlsGetValue
MulDiv
GlobalUnlock
lstrcatA
GlobalLock
LockResource
GlobalGetAtomNameA
LoadResource
GetFileAttributesA
FreeResource
GlobalAddAtomA
FreeLibrary
GetCurrentThread
CreateFileA
SetStdHandle
GetLastError
GetCurrentDirectoryA
FindFirstFileA
FindClose
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
CloseHandle
SetEnvironmentVariableA
GetCurrentThreadId
SetErrorMode
user32
IsDialogMessageA
SetRectEmpty
LoadAcceleratorsA
TranslateAcceleratorA
ReleaseCapture
GetDesktopWindow
SendDlgItemMessageA
IsWindow
DestroyMenu
LoadMenuA
LoadIconA
SetMenu
ReuseDDElParam
UnpackDDElParam
SetWindowTextA
InvalidateRect
IsIconic
BringWindowToTop
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadStringA
GetClassNameA
LoadCursorA
CharUpperA
OemToCharA
CharToOemA
FillRect
InflateRect
ClientToScreen
WindowFromPoint
RegisterWindowMessageA
OffsetRect
GetDCEx
LockWindowUpdate
SetCapture
IntersectRect
SetParent
InvertRect
SetActiveWindow
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
IsChild
GetCapture
WinHelpA
SetRect
SystemParametersInfoA
GetMenu
GetWindowTextLengthA
GetWindowTextA
DefWindowProcA
DestroyWindow
CreateWindowExA
SetPropA
GetPropA
RemovePropA
CallWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetWindowLongA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
SetFocus
GetMessageA
TranslateMessage
DispatchMessageA
GetKeyState
CallNextHookEx
ValidateRect
PeekMessageA
GetCursorPos
UnhookWindowsHookEx
SetWindowsHookExA
MessageBoxA
IsWindowEnabled
GetLastActivePopup
SetCursor
ShowOwnedPopups
IsWindowVisible
UpdateWindow
PostMessageA
PostQuitMessage
SendMessageA
GetDlgItem
DialogBoxIndirectParamA
DialogBoxParamA
EnableWindow
GetWindow
GetWindowLongA
GetParent
EndDialog
SetTimer
KillTimer
PtInRect
GetClientRect
GetWindowRect
GetSystemMetrics
SetWindowPos
GetSysColor
RegisterClassA
GetClassInfoA
GetMenuItemID
CopyRect
FindWindowA
SetForegroundWindow
wsprintfA
ShowWindow
GetSubMenu
GetMenuItemCount
GetDlgCtrlID
SetMessageQueue
gdi32
CreateFontA
RealizePalette
CreatePalette
CreateBitmap
SetTextColor
SetBkColor
GetObjectA
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetBkMode
SelectPalette
StretchDIBits
SetMapMode
OffsetViewportOrgEx
SetViewportExtEx
SetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
GetClipBox
SetWindowExtEx
SelectClipRgn
SetTextAlign
DeleteObject
CreateRectRgn
GetDeviceCaps
CreatePen
CreateSolidBrush
PtVisible
RectVisible
CreatePatternBrush
ExtTextOutA
Escape
TextOutA
CreateFontIndirectA
GetTextExtentPointA
PatBlt
SetRectRgn
CreateRectRgnIndirect
CombineRgn
BitBlt
CreateCompatibleDC
GetTextMetricsA
comdlg32
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
shell32
ShellExecuteA
DragFinish
DragQueryFileA
Sections
.text Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 9KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ