Static task
static1
Behavioral task
behavioral1
Sample
3dea3e14f17f08bd41a84a97811dee18_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3dea3e14f17f08bd41a84a97811dee18_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3dea3e14f17f08bd41a84a97811dee18_JaffaCakes118
-
Size
963KB
-
MD5
3dea3e14f17f08bd41a84a97811dee18
-
SHA1
8d9affdacf6a5cac3f17efb628eb67532b8c3781
-
SHA256
73e6aa30b00a02fa5666001c34405c821698ce9b0f4ed758fb0b8a80a97a6664
-
SHA512
3d13511340ebac6966d8d53d3362ceaadf2694fd5510f193fbdd3d8d72c578b3d56b36f420c8b7bd4a7877d2d9d76384f831af6870bbd5862cd64f22392cd3d1
-
SSDEEP
24576:7dbltf5VWXMcyiuo6VNwKcNxuHngGRcDnCKoi:7dJtfjWXqoiNwKyuA6cDtoi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3dea3e14f17f08bd41a84a97811dee18_JaffaCakes118
Files
-
3dea3e14f17f08bd41a84a97811dee18_JaffaCakes118.exe windows:5 windows x86 arch:x86
eebb109bbf5d98a3b188d10a59a35f96
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowTextLengthA
RegisterWindowMessageA
SetDlgItemTextW
SendMessageA
SetScrollPos
LoadImageA
MapWindowPoints
GetIconInfo
EnumWindows
BringWindowToTop
SetPropA
GetClassNameA
IsIconic
CopyIcon
CheckDlgButton
AppendMenuA
CharLowerW
IsDialogMessageA
MessageBoxA
UpdateWindow
GetMenuItemCount
IsWindowVisible
SetWindowLongA
GetFocus
GetSystemMenu
GetPropA
GetMessageA
GetMenuItemID
SetMenu
EnableMenuItem
RegisterClassA
SetMenuItemInfoA
IsCharAlphaA
SetWindowPos
SetCursor
GetDC
LoadIconA
GetWindowLongA
SendDlgItemMessageA
GetWindowTextA
LoadCursorA
GetKeyState
TranslateMessage
GetDesktopWindow
PostQuitMessage
CreateIconIndirect
OpenClipboard
SetForegroundWindow
CreateDialogParamA
GetSystemMetrics
WindowFromPoint
FillRect
LoadAcceleratorsA
DestroyWindow
IsChild
SetWindowTextA
DeleteMenu
TranslateAcceleratorA
CreateWindowExA
EndPaint
IntersectRect
SetWindowTextW
EnumChildWindows
DrawIconEx
PostMessageA
DialogBoxParamA
GetWindowPlacement
ExitWindowsEx
ClientToScreen
OemToCharBuffA
PostThreadMessageA
CloseClipboard
DefWindowProcA
GetCursorPos
IsWindow
CreateDialogIndirectParamA
GetDlgItem
CreatePopupMenu
GetMenuItemInfoA
DispatchMessageA
InsertMenuItemA
ShowWindow
OemToCharA
GetMenuState
FindWindowA
MoveWindow
EmptyClipboard
GetWindow
AppendMenuW
CharUpperW
RegisterClipboardFormatA
GetParent
GetDialogBaseUnits
DestroyMenu
GetSubMenu
SetDlgItemInt
ReleaseDC
SetDlgItemTextA
CharToOemBuffA
ValidateRect
EndDialog
MessageBeep
CreateIcon
GetWindowThreadProcessId
IsCharUpperA
DrawMenuBar
GetClientRect
IsCharAlphaW
RemovePropA
PeekMessageA
LoadMenuA
PtInRect
FindWindowExA
IsDlgButtonChecked
DestroyIcon
GetDlgItemInt
SetFocus
BeginPaint
GetWindowTextW
CheckMenuItem
SetScrollRange
GetLastActivePopup
CharLowerA
GetMenu
GetDlgItemTextA
IsWindowEnabled
InsertMenuA
LoadStringA
CallWindowProcA
GetClipboardData
IsCharUpperW
CharToOemA
SetClipboardData
TrackPopupMenu
LoadBitmapA
SendMessageW
CharUpperA
SetTimer
CopyImage
FlashWindow
ScreenToClient
GetWindowRect
RedrawWindow
ScrollWindowEx
KillTimer
GetSysColor
InvalidateRect
EnableWindow
SetWindowPlacement
gdi32
GetTextExtentPoint32A
ExtTextOutA
CreatePen
CreateFontA
DeleteDC
LineTo
Polyline
Polygon
GetMapMode
GetPixel
DPtoLP
CreateSolidBrush
SetPixel
GetTextMetricsA
SelectObject
CreateBitmap
CreatePatternBrush
DeleteObject
GetObjectA
SetTextColor
GetDeviceCaps
CreateCompatibleBitmap
StretchBlt
MoveToEx
TextOutA
GetTextFaceA
SetBkColor
CreateCompatibleDC
SetMapMode
BitBlt
Rectangle
comdlg32
GetOpenFileNameA
GetSaveFileNameA
GetOpenFileNameW
CommDlgExtendedError
ChooseFontA
comctl32
ImageList_ReplaceIcon
ImageList_AddMasked
ImageList_Destroy
ImageList_Add
ImageList_Remove
PropertySheetA
ImageList_Create
advapi32
RegDeleteKeyA
RegSetValueExA
OpenProcessToken
RegEnumValueA
GetSecurityDescriptorLength
GetFileSecurityA
RegOpenKeyExA
RegCreateKeyExA
AdjustTokenPrivileges
SetFileSecurityW
RegQueryValueExW
RegCloseKey
SetFileSecurityA
LookupPrivilegeValueA
RegSetValueExW
RegDeleteValueA
GetFileSecurityW
RegQueryValueExA
RegEnumKeyExA
shell32
SHBrowseForFolderA
ShellExecuteA
SHGetFileInfoA
SHFileOperationA
SHGetDesktopFolder
Shell_NotifyIconA
DragQueryFileA
SHChangeNotify
ExtractIconExA
SHGetMalloc
DragFinish
SHGetSpecialFolderLocation
FindExecutableA
SHGetPathFromIDListA
DragAcceptFiles
ShellExecuteExA
DragQueryFileW
kernel32
LoadResource
FormatMessageA
GetStdHandle
TerminateProcess
InitializeCriticalSectionAndSpinCount
GlobalSize
ExitProcess
EndUpdateResourceA
GetLocalTime
SystemTimeToFileTime
LoadLibraryA
WaitForSingleObject
CompareStringA
FreeEnvironmentStringsA
GetStartupInfoA
SetCurrentDirectoryA
FindFirstFileW
LeaveCriticalSection
GetStringTypeA
ExpandEnvironmentStringsA
CreateDirectoryW
WideCharToMultiByte
LocalFileTimeToFileTime
GetVersion
LocalFree
SetFilePointer
CompareFileTime
SetFileAttributesW
GetCurrentDirectoryW
FindFirstFileA
BackupSeek
RtlUnwind
GetCurrentThread
VirtualFree
SetEnvironmentVariableA
GetFullPathNameW
GetTimeFormatA
RemoveDirectoryW
GetProfileStringA
GetCurrentProcessId
FindNextFileW
CreateThread
Sleep
MoveFileA
GetLogicalDrives
GetCurrentProcess
lstrcmpiA
GetStringTypeW
GetOEMCP
HeapReAlloc
GetLastError
CreateFileW
FindCloseChangeNotification
HeapSize
UpdateResourceA
GetPrivateProfileStringA
CreateFileMappingA
GetConsoleCP
GetFileTime
BeginUpdateResourceA
CompareStringW
HeapFree
ResumeThread
WriteConsoleA
EnumResourceLanguagesA
CreateFileA
DeviceIoControl
BackupRead
GetEnvironmentStrings
GetModuleHandleA
GetCommandLineA
FileTimeToSystemTime
FindFirstChangeNotificationA
GetConsoleOutputCP
OpenFileMappingA
ResetEvent
GlobalMemoryStatus
lstrlenA
GetPrivateProfileIntA
VirtualAlloc
FindNextFileA
InterlockedDecrement
FreeEnvironmentStringsW
CreateEventA
GetACP
GlobalLock
GetCPInfo
GetDateFormatA
TlsSetValue
ReadFile
LCMapStringA
WritePrivateProfileStringA
HeapAlloc
FreeLibrary
GetDiskFreeSpaceA
CreateDirectoryA
GetProcessAffinityMask
IsDBCSLeadByte
GlobalAlloc
GetThreadPriority
GlobalFree
GetModuleFileNameA
UnhandledExceptionFilter
GetTickCount
InterlockedIncrement
GetNumberFormatA
MapViewOfFile
GetProcAddress
GetPriorityClass
LCMapStringW
SetFileTime
MoveFileW
LoadLibraryExA
TlsFree
IsDebuggerPresent
SetHandleCount
SetErrorMode
MultiByteToWideChar
GetConsoleMode
SetStdHandle
EnterCriticalSection
GetCompressedFileSizeA
GetSystemTime
QueryPerformanceCounter
lstrcpyA
IsValidCodePage
DeleteFileW
GetEnvironmentStringsW
GetFileAttributesW
ExitThread
GetSystemTimeAsFileTime
GetModuleHandleW
GetLocaleInfoA
FindClose
DeleteFileA
WriteFile
RaiseException
CopyFileA
GetTempPathA
FlushFileBuffers
SetFileAttributesA
GetLogicalDriveStringsA
SizeofResource
TlsGetValue
SetThreadPriority
GetDriveTypeA
SuspendThread
GetFileAttributesA
SetUnhandledExceptionFilter
FindResourceA
SetCurrentDirectoryW
CloseHandle
SetEvent
GetFullPathNameA
GetCurrentDirectoryA
TlsAlloc
SetLastError
MulDiv
FindNextChangeNotification
DosDateTimeToFileTime
WaitForMultipleObjects
SetEndOfFile
RemoveDirectoryA
FileTimeToDosDateTime
SetPriorityClass
DeleteCriticalSection
ReleaseMutex
FileTimeToLocalFileTime
GetCommandLineW
HeapCreate
CreateMutexA
GetCurrentThreadId
GetProcessHeap
UnmapViewOfFile
EnumResourceNamesA
WriteConsoleW
GlobalUnlock
GetFileType
ExpandEnvironmentStringsW
GetVersionExA
msvfw32
DrawDibSetPalette
ICRemove
ole32
DoDragDrop
OleUninitialize
OleSetClipboard
OleInitialize
CoCreateInstance
Sections
.text Size: 517KB - Virtual size: 516KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 406KB - Virtual size: 3.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ