Static task
static1
Behavioral task
behavioral1
Sample
426450909d8e61edb5820461022fea4f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
426450909d8e61edb5820461022fea4f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
426450909d8e61edb5820461022fea4f_JaffaCakes118
-
Size
164KB
-
MD5
426450909d8e61edb5820461022fea4f
-
SHA1
8fa46c24ae36361c34037a3b7beaf2194e0ce5a3
-
SHA256
e843a3c52975dddf45c1558ce14c30314cc213a23d3742df602e7d986041f524
-
SHA512
2cd42d059e2bec828aa42320a2251e6fe772ff93dfc09a0fffd94c8e654752ce6fc61e5c3d1f244a121d9ae204642dfe0dc1fc79068f603a66f451b0740d8c40
-
SSDEEP
3072:bNJZHE90ciDuG6o20ahDZGvoW68j5LEfgJq/+UWtAW+HQ4:R3k9GuG6oSHGgWfLEit1+HH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 426450909d8e61edb5820461022fea4f_JaffaCakes118
Files
-
426450909d8e61edb5820461022fea4f_JaffaCakes118.exe windows:4 windows x86 arch:x86
3707168cad751bda774f335c4cbf1e50
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetClipboardData
IntersectRect
GetForegroundWindow
DrawMenuBar
CheckMenuItem
RegisterWindowMessageA
GetWindowLongW
CharLowerBuffA
SetScrollRange
WaitMessage
DrawTextA
KillTimer
MoveWindow
GetDCEx
IsDialogMessageW
ScrollWindow
CharNextA
GetSysColor
GetMenuStringA
GetPropA
RemoveMenu
EnumThreadWindows
MessageBeep
IsWindow
CharUpperBuffA
GetDesktopWindow
InsertMenuItemA
OffsetRect
GetKeyboardLayout
ShowWindow
LoadCursorA
GetMenuItemID
OpenClipboard
AdjustWindowRectEx
SetWindowTextA
GetKeyboardLayoutList
FindWindowA
EmptyClipboard
ShowOwnedPopups
DispatchMessageA
GetFocus
GetTopWindow
SetClassLongA
SetWindowPos
GetKeyboardType
SetScrollPos
FrameRect
IsChild
EnumWindows
GetMenuItemInfoA
CreatePopupMenu
GetMenuState
GetMenuItemCount
EnableWindow
LoadStringA
GetKeyState
IsWindowUnicode
FillRect
SetWindowPlacement
LoadBitmapA
GetWindowDC
EnumChildWindows
GetKeyboardLayoutNameA
SetCapture
DeleteMenu
DrawIconEx
SetRect
SetCursor
DestroyIcon
DrawAnimatedRects
SetWindowsHookExA
EnableScrollBar
PeekMessageW
TrackPopupMenu
UnregisterClassA
EqualRect
IsWindowEnabled
GetDlgItem
LoadKeyboardLayoutA
DefWindowProcA
SetMenu
GetIconInfo
MsgWaitForMultipleObjects
GetSubMenu
GetKeyNameTextA
RegisterClipboardFormatA
ChildWindowFromPoint
SetTimer
IsZoomed
DrawEdge
LoadIconA
GetSystemMetrics
SetParent
DestroyWindow
GetSysColorBrush
PtInRect
EnableMenuItem
wsprintfA
TranslateMessage
CreateMenu
GetWindowLongA
InflateRect
GetLastActivePopup
InvalidateRect
GetCursorPos
EndPaint
SetForegroundWindow
DestroyMenu
BeginPaint
PostMessageA
InsertMenuA
ReleaseDC
DefFrameProcA
ShowScrollBar
SetPropA
SendMessageA
GetMessagePos
UnhookWindowsHookEx
DispatchMessageW
ReleaseCapture
CallNextHookEx
IsDialogMessageA
SetWindowLongW
CreateIcon
GetClientRect
RemovePropA
SystemParametersInfoA
GetWindowRect
GetActiveWindow
PeekMessageA
GetWindowThreadProcessId
IsWindowVisible
GetParent
UpdateWindow
CallWindowProcA
SetActiveWindow
DefMDIChildProcA
MessageBoxA
GetDC
ClientToScreen
GetScrollPos
TranslateMDISysAccel
WindowFromPoint
RegisterClassA
GetMenu
CharLowerA
ActivateKeyboardLayout
DrawIcon
CreateWindowExA
GetClassInfoA
DestroyCursor
IsRectEmpty
GetClipboardData
DrawFrameControl
GetScrollInfo
SetFocus
GetWindowPlacement
GetSystemMenu
SetScrollInfo
OemToCharA
MapWindowPoints
GetCapture
GetWindow
RedrawWindow
SendMessageW
GetScrollRange
GetClassLongA
GetKeyboardState
PostQuitMessage
GetCursor
CharNextW
GetWindowTextA
kernel32
GetFileSize
SetErrorMode
GetSystemDefaultLangID
MoveFileExA
WaitForSingleObject
HeapFree
SetEndOfFile
CreateEventA
GetOEMCP
SetLastError
GetFileAttributesA
MoveFileA
HeapAlloc
GetProcessHeap
MulDiv
LoadLibraryExA
ResetEvent
GetEnvironmentStrings
DeleteFileA
LoadResource
GetVersion
GetACP
GetLastError
lstrcmpA
GetTickCount
lstrcpyA
VirtualFree
GetStartupInfoA
GetThreadLocale
GetModuleFileNameA
FindClose
LockResource
FindFirstFileA
GetCPInfo
GetCurrentProcess
VirtualQuery
FreeLibrary
VirtualAllocEx
CreateThread
GlobalFindAtomA
GetDiskFreeSpaceA
GetProcAddress
SetFilePointer
ExitThread
GlobalAlloc
DeleteCriticalSection
GetCurrentThread
LocalAlloc
Sleep
FormatMessageA
GlobalAddAtomA
WriteFile
CompareStringA
LoadLibraryA
WideCharToMultiByte
CloseHandle
GetLocaleInfoA
InitializeCriticalSection
HeapDestroy
VirtualAlloc
GlobalDeleteAtom
ReadFile
ExitProcess
lstrlenA
FreeResource
CreateFileA
SetEvent
lstrcmpiA
GetVersionExA
SetThreadLocale
lstrcpynA
GetStdHandle
EnterCriticalSection
LocalFree
GetDateFormatA
GetLocalTime
FindResourceA
GetModuleHandleA
LocalReAlloc
GetCurrentThreadId
SizeofResource
msvcrt
srand
sin
memmove
memcpy
Sections
CODE Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ