Static task
static1
Behavioral task
behavioral1
Sample
4045cfcf4addfede331fe9a93862ac3b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4045cfcf4addfede331fe9a93862ac3b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4045cfcf4addfede331fe9a93862ac3b_JaffaCakes118
-
Size
181KB
-
MD5
4045cfcf4addfede331fe9a93862ac3b
-
SHA1
84d7f56dcde90208f5829d0ebf835ea438f9f251
-
SHA256
7d04d5b354597231a7d63006a42b240c90d148936bcbe688ad1586f73883f3f0
-
SHA512
588ac803213b59f44d5519afe6027854d3fbe61caaf22a335893f4ff56343b65241281280d7d1eccb50fe28bac3ae56c0eff3b1392a6d7cbfc26ba271aba0923
-
SSDEEP
3072:2/sqIctNz/rjL2iMOYXYMngUAaXmD3xOAGjxbsiyI:2ZIctBPCHXXhkaXmD3cAG5siyI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4045cfcf4addfede331fe9a93862ac3b_JaffaCakes118
Files
-
4045cfcf4addfede331fe9a93862ac3b_JaffaCakes118.exe windows:4 windows x86 arch:x86
673bb4bd75ef37db67c391304d797d72
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdiplus
GdipCreateHBITMAPFromBitmap
GdipCloneImage
kernel32
GetModuleHandleW
MulDiv
FindFirstChangeNotificationW
GetACP
LocalFree
LoadLibraryW
GetThreadLocale
GetCurrentThreadId
InterlockedExchange
GetSystemTimeAsFileTime
LoadLibraryA
QueryDosDeviceA
Sleep
QueryPerformanceCounter
GetProcessId
GetModuleFileNameW
GlobalUnlock
GetCurrentDirectoryW
WaitForSingleObject
GlobalLock
CreateThread
GetVersionExW
lstrcpyW
FileTimeToSystemTime
InterlockedIncrement
GetNumberFormatW
GetProcAddress
EnumResourceTypesA
FreeLibrary
FindCloseChangeNotification
FindFirstFileW
GetLastError
GetPrivateProfileIntW
GlobalFree
LoadResource
GetFileAttributesW
DeleteFileW
FindClose
GetLocaleInfoA
LockResource
MultiByteToWideChar
GetTickCount
GetVersionExA
FileTimeToLocalFileTime
GetPrivateProfileStringW
SetFileAttributesW
GetLocaleInfoW
CloseHandle
lstrcmpW
WritePrivateProfileStringW
GetVersion
DeleteCriticalSection
ExitProcess
GlobalSize
SetThreadPriority
FindResourceW
ResumeThread
lstrcpynW
GlobalAlloc
FindNextChangeNotification
lstrlenW
LoadLibraryExW
InterlockedDecrement
WideCharToMultiByte
InitializeCriticalSection
GetCurrentProcessId
user32
GetActiveWindow
SystemParametersInfoW
EnableMenuItem
GetLastActivePopup
GetMenu
BringWindowToTop
DrawIconEx
LockWindowUpdate
CloseWindow
GetClassNameW
GetSystemMenu
LoadIconW
GetClipboardData
GetMenuItemInfoW
SetCapture
DispatchMessageW
SetFocus
wsprintfW
PostMessageW
DrawFocusRect
CopyRect
FindWindowW
EndDeferWindowPos
EnableScrollBar
SetWindowLongW
GetMenuItemCount
DestroyCaret
SetWindowsHookExW
GetDlgCtrlID
DrawAnimatedRects
GetDlgItem
LoadCursorW
ShowWindow
SetClipboardData
IsIconic
ScreenToClient
IsClipboardFormatAvailable
CreateCaret
DrawIcon
SendMessageW
DestroyAcceleratorTable
KillTimer
LoadImageW
CloseClipboard
SetCursor
DrawTextExW
RedrawWindow
GetMessagePos
SystemParametersInfoA
MapVirtualKeyW
GetNextDlgTabItem
TabbedTextOutW
MoveWindow
GetWindowRect
MapVirtualKeyExW
GrayStringW
LoadBitmapW
DrawFrameControl
SetCursorPos
SetParent
TranslateMessage
DeleteMenu
GetKeyboardLayout
ClientToScreen
IsZoomed
GetDC
MapWindowPoints
DrawEdge
FillRect
GetSubMenu
PeekMessageW
GetSystemMetrics
LoadMenuW
SetActiveWindow
EnumChildWindows
EmptyClipboard
InsertMenuW
TrackPopupMenu
DragDetect
GetWindowLongW
GetMessageW
GetScrollInfo
SetMenu
InflateRect
GetMenuState
ReleaseCapture
EqualRect
GetForegroundWindow
SetTimer
GetCapture
OffsetRect
SetForegroundWindow
IntersectRect
GetWindowTextW
IsWindowVisible
CopyAcceleratorTableW
GetKeyNameTextW
SetCaretPos
UnionRect
GetWindowPlacement
DestroyCursor
CallWindowProcW
ShowCaret
MessageBeep
GetIconInfo
BeginDeferWindowPos
ReleaseDC
DestroyWindow
DrawTextW
GetMenuDefaultItem
GetScrollPos
GetWindow
GetDCEx
DrawStateW
GetCursor
GetDesktopWindow
InvalidateRect
SetWindowPos
HideCaret
IsChild
GetFocus
SetScrollInfo
EnableWindow
RegisterClipboardFormatW
CreateIconIndirect
RegisterWindowMessageW
CopyIcon
CreateAcceleratorTableW
ShowScrollBar
GetSysColorBrush
PtInRect
CallNextHookEx
GetMenuItemID
OpenClipboard
UnhookWindowsHookEx
SetWindowRgn
mouse_event
WindowFromPoint
GetCursorPos
GetTabbedTextExtentW
IsMenu
SetScrollPos
SetRectEmpty
GetKeyState
GetClientRect
DeferWindowPos
SetRect
UpdateWindow
GetParent
IsWindow
SetMenuDefaultItem
IsCharLowerW
AppendMenuW
IsRectEmpty
DestroyIcon
GetClassLongW
CheckMenuItem
CreatePopupMenu
GetSysColor
DestroyMenu
shell32
SHGetPathFromIDListW
ShellExecuteW
SHBrowseForFolderW
ShellExecuteExW
DragAcceptFiles
SHGetMalloc
SHGetFileInfoW
SHGetDesktopFolder
SHAppBarMessage
SHGetSpecialFolderLocation
Shell_NotifyIconW
comctl32
ImageList_LoadImageW
ImageList_Add
ImageList_GetImageCount
InitCommonControlsEx
_TrackMouseEvent
ImageList_AddMasked
ImageList_GetImageInfo
ImageList_Destroy
PropertySheetW
ImageList_GetIcon
ImageList_ReplaceIcon
ImageList_Draw
ole32
DoDragDrop
CoCreateInstance
OleRun
gdi32
Rectangle
SetPixelV
GetTextExtentPoint32W
GetBkColor
CreateDIBSection
advapi32
RegQueryValueExW
RegDeleteValueW
RegSetValueExW
RegEnumValueW
RegDeleteKeyW
RegOpenKeyExW
RegOpenKeyW
RegEnumKeyExW
RegCreateKeyExW
RegCloseKey
Sections
.text Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ