Static task
static1
Behavioral task
behavioral1
Sample
54b9010a69f8c0c312537c5557039dc1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54b9010a69f8c0c312537c5557039dc1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
54b9010a69f8c0c312537c5557039dc1_JaffaCakes118
-
Size
105KB
-
MD5
54b9010a69f8c0c312537c5557039dc1
-
SHA1
01de0f5f7918af920d3be8a0510ba7937cb1aca2
-
SHA256
abbe6b80e8d186959fc779008c0265be0482f794457dbb1478154011841f151b
-
SHA512
27f7dd086f37968d97b7ff938edfa53035cc52bf253399c0b308d02d7e249228f85313ccc038d20f40db24e02c8bbb1319e9dd3442f2037e498cbf86859017f7
-
SSDEEP
1536:9tAh4HDp+5M2ie7u/EWa5XGcyzfKQTE3x3EpP+GvWw:7Ah4jpHXeoEf52cyzfnE3x3UP+d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 54b9010a69f8c0c312537c5557039dc1_JaffaCakes118
Files
-
54b9010a69f8c0c312537c5557039dc1_JaffaCakes118.exe windows:4 windows x86 arch:x86
433c54d67d00cef044dc6905105ae97b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetClipBox
CreateCompatibleBitmap
RestoreDC
GetCurrentPositionEx
CreateBitmap
GetDIBColorTable
GetRgnBox
CopyEnhMetaFileA
msvcrt
memcpy
calloc
memmove
wcscspn
log
kernel32
DeleteFileA
GetThreadLocale
ReadFile
SetErrorMode
MoveFileA
SizeofResource
GetStringTypeW
FindClose
ResetEvent
LocalReAlloc
WriteFile
VirtualQuery
LockResource
GetCurrentProcess
CloseHandle
InitializeCriticalSection
FreeLibrary
lstrlenA
VirtualAlloc
CreateThread
GetVersion
FindFirstFileA
CreateEventA
FormatMessageA
GetCurrentProcessId
lstrcpynA
GetModuleHandleA
WideCharToMultiByte
GetStdHandle
lstrcpyA
VirtualFree
EnterCriticalSection
FindResourceA
GetEnvironmentStrings
GlobalDeleteAtom
GetUserDefaultLCID
HeapFree
lstrcmpiA
lstrcatA
GetACP
GlobalAlloc
GetCurrentThreadId
GlobalFindAtomA
MoveFileExA
GetModuleFileNameA
Sleep
SetLastError
EnumCalendarInfoA
LoadLibraryA
HeapDestroy
GetOEMCP
LoadResource
SetEvent
ExitThread
LocalFree
GetFileSize
LoadLibraryExA
GetProcessHeap
GlobalAddAtomA
SetHandleCount
VirtualAllocEx
ExitProcess
HeapAlloc
FreeResource
GetFullPathNameA
SetThreadLocale
RaiseException
lstrcmpA
GetLocalTime
CompareStringA
WaitForSingleObject
LocalAlloc
SetFilePointer
DeleteCriticalSection
GetDiskFreeSpaceA
GetDateFormatA
MulDiv
GetProcAddress
GetVersionExA
GetSystemDefaultLangID
GetCurrentThread
GetLocaleInfoA
CreateFileA
GetTickCount
GetStartupInfoA
GetCPInfo
GetFileAttributesA
GetLastError
oleaut32
SysReAllocStringLen
SysStringLen
SafeArrayCreate
RegisterTypeLib
VariantChangeType
SafeArrayUnaccessData
SafeArrayGetUBound
SafeArrayPtrOfIndex
user32
DrawMenuBar
SetParent
SetWindowPos
CreateWindowExA
GetFocus
DrawAnimatedRects
GetDesktopWindow
GetIconInfo
EnableScrollBar
GetKeyboardState
GetScrollInfo
GetDCEx
BeginPaint
SetCapture
MessageBeep
GetKeyState
RegisterClipboardFormatA
DrawTextA
MapVirtualKeyA
DrawIconEx
InsertMenuItemA
GetMessagePos
DestroyCursor
CharUpperBuffA
UnregisterClassA
GetWindow
SetScrollInfo
LoadIconA
ReleaseCapture
SetCursor
WaitMessage
GetClassNameA
SetClipboardData
GetDlgItem
DefMDIChildProcA
GetClassLongA
SetScrollRange
DispatchMessageW
IsWindowVisible
FillRect
GetClientRect
GetWindowThreadProcessId
MessageBoxA
OpenClipboard
ShowWindow
IsDialogMessageW
SetPropA
OemToCharA
CreateMenu
CharLowerBuffA
DispatchMessageA
GetWindowTextA
CallWindowProcA
ScreenToClient
SetRect
CloseClipboard
TrackPopupMenu
FrameRect
UpdateWindow
FindWindowA
GetLastActivePopup
SetWindowLongW
GetMenuItemCount
GetClipboardData
RemovePropA
DeleteMenu
PtInRect
InsertMenuA
GetWindowRect
RegisterClassA
CharLowerA
CheckMenuItem
UnhookWindowsHookEx
EndPaint
GetSubMenu
InvalidateRect
GetCursor
GetKeyboardLayout
EnumThreadWindows
CharNextW
PeekMessageW
ChildWindowFromPoint
EnumWindows
SetForegroundWindow
IsIconic
CreatePopupMenu
ReleaseDC
TranslateMDISysAccel
SetActiveWindow
GetSysColorBrush
GetKeyboardLayoutNameA
IsWindow
GetWindowLongA
IsZoomed
SendMessageW
RedrawWindow
CallNextHookEx
LoadBitmapA
SetFocus
DefWindowProcA
PostMessageA
IsWindowUnicode
GetSystemMetrics
GetCapture
PeekMessageA
LoadKeyboardLayoutA
ActivateKeyboardLayout
ShowScrollBar
GetForegroundWindow
AdjustWindowRectEx
SetWindowTextA
GetClassInfoA
DrawEdge
WindowFromPoint
OffsetRect
InflateRect
GetPropA
DrawIcon
GetWindowDC
LoadCursorA
SystemParametersInfoA
GetMenuState
IntersectRect
RegisterWindowMessageA
CharToOemA
DestroyIcon
DestroyWindow
GetMenu
SetWindowsHookExA
GetKeyNameTextA
DrawFrameControl
EnumChildWindows
GetKeyboardLayoutList
CreateIcon
IsChild
IsWindowEnabled
LoadStringA
GetSysColor
EnableMenuItem
SetWindowLongA
DestroyMenu
MapWindowPoints
RemoveMenu
GetScrollRange
ScrollWindow
GetActiveWindow
SetScrollPos
GetMenuItemID
GetParent
GetMenuStringA
SetTimer
wsprintfA
GetScrollPos
IsDialogMessageA
GetTopWindow
TranslateMessage
GetKeyboardType
GetDC
EmptyClipboard
SetMenuItemInfoA
MsgWaitForMultipleObjects
EqualRect
SendMessageA
IsRectEmpty
MoveWindow
KillTimer
GetWindowPlacement
ShowOwnedPopups
PostQuitMessage
GetMenuItemInfoA
Sections
CODE Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.init Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ