Static task
static1
Behavioral task
behavioral1
Sample
551f92e9c04ba80b8a84ead71adb69ba_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
551f92e9c04ba80b8a84ead71adb69ba_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
551f92e9c04ba80b8a84ead71adb69ba_JaffaCakes118
-
Size
170KB
-
MD5
551f92e9c04ba80b8a84ead71adb69ba
-
SHA1
d01728efa3380366b85178c935467e5dc08f02ff
-
SHA256
db989713dd52b336edc7916d39028189ff1f09713e1020f2f5e3ad625a341b3d
-
SHA512
017ce3dbaa4fb4a962dd1a63aad6eb81c0b82f3aa085d6e437f618ee9ec2f07d2bd83a648c92e60bc41701ab845cbfd8e8b02249b2b66fddc8d9b62d087708f7
-
SSDEEP
3072:mxhYwnEG/5TyoN/YlkTNHrknpCCtTS/08809e91pp:oEWy4wUHrknpi/P84Mpp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 551f92e9c04ba80b8a84ead71adb69ba_JaffaCakes118
Files
-
551f92e9c04ba80b8a84ead71adb69ba_JaffaCakes118.exe windows:4 windows x86 arch:x86
568960f5f9d916e12d6e5b5992d2f039
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateCompatibleBitmap
EndPath
BeginPath
BitBlt
PtInRegion
SelectObject
CreatePolygonRgn
CreateBitmap
GetDeviceCaps
SetStretchBltMode
ExtCreatePen
CreateSolidBrush
SetBkMode
LineTo
InvertRgn
Polyline
GetBitmapBits
CreateFontIndirectW
StretchBlt
CreatePen
SetROP2
CreateDIBSection
StrokePath
DeleteObject
MoveToEx
CreateDCW
GetObjectType
CreateCompatibleDC
DeleteDC
GetObjectW
msimg32
AlphaBlend
TransparentBlt
gdiplus
GdipGetImageWidth
GdipCreateBitmapFromFile
GdipGetImagePixelFormat
GdipGetImageHeight
GdipDisposeImage
ole32
CoInitialize
CoUninitialize
StringFromGUID2
CoFreeUnusedLibraries
CoCreateInstance
advapi32
RegDeleteKeyW
RegSetValueExW
RegCreateKeyW
RegQueryValueExW
RegSetValueW
RegCloseKey
RegOpenKeyExW
RegEnumKeyExW
shell32
SHGetSpecialFolderPathW
DragQueryFileW
user32
GetWindowRect
InvalidateRect
CopyRect
SetWindowPos
TranslateMessage
PtInRect
SetRectEmpty
ReleaseCapture
EqualRect
OpenClipboard
GetFocus
ClientToScreen
FillRect
DestroyMenu
RedrawWindow
SetRect
SendMessageW
SetParent
SetClipboardData
GetClipboardData
SetCursor
EnableWindow
GetDesktopWindow
CloseClipboard
CreatePopupMenu
GetKeyState
EmptyClipboard
LoadCursorW
ReleaseDC
SetCapture
GetClientRect
IsRectEmpty
GetParent
wsprintfW
UnionRect
UpdateWindow
IsWindow
ClipCursor
TrackPopupMenuEx
OffsetRect
GetDC
IntersectRect
ScreenToClient
shlwapi
PathIsDirectoryW
PathAppendW
PathCombineW
PathRenameExtensionW
PathIsRelativeW
PathRemoveFileSpecW
PathRemoveBackslashW
PathAddBackslashW
PathFileExistsW
kernel32
GlobalAlloc
ClearCommBreak
DeleteFileW
GetVersionExW
GlobalUnlock
GetSystemTimeAsFileTime
LoadLibraryW
CloseHandle
InitializeCriticalSection
GetModuleFileNameW
CreateFileW
GetTempFileNameW
GetTempPathW
ClearCommBreak
LocalFree
DisableThreadLibraryCalls
LocalAlloc
MultiByteToWideChar
ReadFile
GetProcAddress
ExitProcess
DeleteCriticalSection
RemoveDirectoryW
EnumResourceNamesW
QueryPerformanceCounter
GetACP
GetCurrentThreadId
GetFullPathNameW
Sleep
SetFileAttributesW
CreateDirectoryW
InterlockedDecrement
InterlockedIncrement
GetThreadLocale
ExitProcess
EnterCriticalSection
CopyFileW
InterlockedExchange
GetModuleFileNameA
lstrlenW
GetTickCount
GetLocaleInfoA
lstrlenA
FindClose
GetLastError
GlobalLock
LeaveCriticalSection
GetCurrentProcessId
FindFirstFileW
FindNextFileW
GetVersionExA
WideCharToMultiByte
OutputDebugStringW
FreeLibrary
GetFileAttributesExW
comctl32
ImageList_DragMove
ImageList_DragLeave
ImageList_DragEnter
winmm
timeGetTime
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsr Size: 512B - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ