Static task
static1
Behavioral task
behavioral1
Sample
3800f531a89fd10e6e93f41d67525435_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3800f531a89fd10e6e93f41d67525435_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3800f531a89fd10e6e93f41d67525435_JaffaCakes118
-
Size
111KB
-
MD5
3800f531a89fd10e6e93f41d67525435
-
SHA1
03796966b9f0b66e44812970f6284fa9a72e1e00
-
SHA256
41677735ed06fc67af2b8ac7bcb0808e658838cccd24a2db5b86e9e191eaa186
-
SHA512
83994d42626bee6d88c93eecc1483cbb195ce1548352733436764f902e412930bbf57da3329c2b6b74d4aa345db9783d26c9ee8992e6ef2446fd96e2da8f2526
-
SSDEEP
1536:GjdXiqpbYBVz5Kiek7tE272jEaVIM/ay5edskZCA:K3FYn5KieKR8Z5edhd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3800f531a89fd10e6e93f41d67525435_JaffaCakes118
Files
-
3800f531a89fd10e6e93f41d67525435_JaffaCakes118.exe windows:4 windows x86 arch:x86
e377373d3e0bc6c16e456c588f962cb6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateCompatibleBitmap
SaveDC
user32
KillTimer
SetActiveWindow
SetClassLongA
GetClassInfoA
MessageBoxA
GetActiveWindow
GetScrollRange
FrameRect
ScrollWindow
SetParent
GetMenuItemCount
TrackPopupMenu
DestroyMenu
OemToCharA
DrawTextA
IsRectEmpty
GetCapture
GetDesktopWindow
GetWindowDC
DeleteMenu
UnregisterClassA
DefFrameProcA
ReleaseCapture
SetWindowPos
GetWindowThreadProcessId
GetClipboardData
SystemParametersInfoA
OffsetRect
SendMessageW
GetDCEx
IsWindowEnabled
GetSysColor
BeginPaint
FindWindowA
ChildWindowFromPoint
GetMenuState
SetCapture
PeekMessageW
PtInRect
LoadCursorA
DispatchMessageW
TranslateMessage
CreateIcon
GetFocus
DestroyWindow
IsIconic
ShowOwnedPopups
MsgWaitForMultipleObjects
ShowWindow
GetWindowLongW
MapVirtualKeyA
SetScrollInfo
GetWindowLongA
CallWindowProcA
SetClipboardData
PostQuitMessage
SetRect
CharLowerA
EqualRect
GetSubMenu
EnumThreadWindows
DrawAnimatedRects
UpdateWindow
DefWindowProcA
GetSystemMenu
GetMessagePos
ActivateKeyboardLayout
DispatchMessageA
GetParent
RegisterClassA
ShowScrollBar
CloseClipboard
CreateWindowExA
DrawFrameControl
GetMenuItemID
GetLastActivePopup
GetPropA
GetMenu
GetKeyNameTextA
GetSysColorBrush
GetMenuItemInfoA
CreateMenu
LoadIconA
SetScrollPos
PeekMessageA
PostMessageA
wsprintfA
IsChild
MapWindowPoints
GetIconInfo
FillRect
InflateRect
RemoveMenu
DrawEdge
DrawIcon
SetWindowTextA
GetKeyboardLayoutList
LoadBitmapA
GetClassNameA
GetScrollPos
MoveWindow
GetSystemMetrics
DrawMenuBar
RemovePropA
DestroyCursor
GetCursorPos
GetTopWindow
GetDlgItem
SetCursor
EnableWindow
CheckMenuItem
WindowFromPoint
GetClassLongA
AdjustWindowRectEx
GetForegroundWindow
ClientToScreen
SetMenu
EnumWindows
SetWindowLongW
UnhookWindowsHookEx
IsDialogMessageA
shlwapi
SHSetValueA
PathIsDirectoryA
PathGetCharTypeA
SHGetValueA
SHEnumValueA
PathIsContentTypeA
oleaut32
SafeArrayGetElement
OleLoadPicture
SysStringLen
SysAllocStringLen
comdlg32
GetOpenFileNameA
ChooseColorA
GetFileTitleA
GetSaveFileNameA
kernel32
GlobalFindAtomA
WriteFile
CreateFileA
GetModuleFileNameA
SetThreadLocale
GetEnvironmentStrings
SetLastError
lstrlenA
WideCharToMultiByte
GetStartupInfoA
ExitProcess
FreeResource
GetCurrentProcess
VirtualAlloc
GetCurrentThreadId
HeapDestroy
GetLocaleInfoA
InitializeCriticalSection
SetErrorMode
EnterCriticalSection
GetDateFormatA
GetFullPathNameA
SizeofResource
GetCPInfo
lstrcmpA
MulDiv
GetProcAddress
MoveFileExA
GetUserDefaultLCID
FreeLibrary
GetOEMCP
GetModuleHandleA
LocalFree
GlobalAddAtomA
SetFilePointer
GetVersionExA
SetEvent
CreateEventA
VirtualFree
HeapFree
GetLocalTime
VirtualAllocEx
GetFileType
lstrcmpiA
CompareStringA
GetCurrentProcessId
GetFileAttributesA
GetThreadLocale
RaiseException
GetStringTypeW
FindResourceA
GetProcessHeap
GetCurrentThread
GetACP
DeleteFileA
lstrcatA
WaitForSingleObject
GlobalAlloc
LoadLibraryA
LoadLibraryExA
GetVersion
HeapAlloc
shell32
Shell_NotifyIconA
SHGetFileInfoA
SHGetDesktopFolder
version
GetFileVersionInfoSizeA
msvcrt
strcmp
calloc
memmove
tan
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: 1024B - Virtual size: 598B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE