Static task
static1
Behavioral task
behavioral1
Sample
55675bd7294faea69108b8988f301f48_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55675bd7294faea69108b8988f301f48_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
55675bd7294faea69108b8988f301f48_JaffaCakes118
-
Size
91KB
-
MD5
55675bd7294faea69108b8988f301f48
-
SHA1
0205694ad5baed2c4f909dde2b008fcb37140684
-
SHA256
bb839993922864d0c202c85f1673703d9b6bfc1962f381f37afaa620b6b76021
-
SHA512
6b70e415812aa0f4e97500340dbda989d1614ed618b18a14d785b580e6a8cace670f48c2480cf47cd08a577871a1057ce4c91f36940b951c63170345904b1307
-
SSDEEP
1536:zeKxaolDf3fHYwdbUd2abD9ILJKnMZVhF2y8zlYuBHUWYVdof:aKxaYbYaboNILJ4Ouy8pwVd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 55675bd7294faea69108b8988f301f48_JaffaCakes118
Files
-
55675bd7294faea69108b8988f301f48_JaffaCakes118.exe windows:4 windows x86 arch:x86
4f5ad672531c32d88cdb9692ac83ebd7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
exp
exit
memmove
log10
clock
sin
memset
memcpy
kernel32
LoadResource
WriteFile
DeleteFileA
GetStdHandle
VirtualFree
GetCurrentThreadId
RaiseException
GetStringTypeW
GetProcAddress
CreateFileA
GetModuleHandleA
GetVersion
GetProcessHeap
FreeLibrary
GetFullPathNameA
FreeResource
SetEvent
CreateEventA
GetLocaleInfoA
FindFirstFileA
ExitProcess
GetStartupInfoA
EnumCalendarInfoA
VirtualAllocEx
GetFileType
lstrcpyA
ReadFile
GetLocalTime
EnterCriticalSection
VirtualAlloc
GetThreadLocale
SizeofResource
WaitForSingleObject
WideCharToMultiByte
CompareStringA
lstrcmpA
GetDiskFreeSpaceA
lstrcmpiA
lstrlenA
SetHandleCount
GetEnvironmentStrings
LoadLibraryA
MoveFileExA
LockResource
GetVersionExA
GlobalAddAtomA
SetErrorMode
GetTickCount
DeleteCriticalSection
CloseHandle
GetCurrentThread
lstrcpynA
GetOEMCP
GetCurrentProcessId
lstrcatA
HeapDestroy
Sleep
GetModuleFileNameA
GetACP
LocalFree
HeapAlloc
GlobalAlloc
GetStringTypeA
GetCPInfo
ResetEvent
InitializeCriticalSection
MoveFileA
SetThreadLocale
LocalAlloc
FindResourceA
LoadLibraryExA
GetSystemDefaultLangID
GetUserDefaultLCID
GetFileSize
FindClose
ExitThread
CreateThread
GetCurrentProcess
SetEndOfFile
LocalReAlloc
GetFileAttributesA
SetLastError
FormatMessageA
GetLastError
GlobalDeleteAtom
user32
GetScrollInfo
SetClipboardData
IsDialogMessageA
EnumChildWindows
IsWindowUnicode
SendMessageW
TrackPopupMenu
OffsetRect
IsChild
UnregisterClassA
GetFocus
CharLowerBuffA
GetClassNameA
GetClipboardData
IsWindowEnabled
GetMessagePos
GetMenuState
IsRectEmpty
PeekMessageW
PostQuitMessage
GetSysColorBrush
ScreenToClient
GetCursorPos
GetWindow
CallNextHookEx
EnableWindow
MessageBeep
GetKeyboardType
SetWindowLongW
DispatchMessageW
GetSysColor
GetWindowRect
GetKeyState
GetKeyboardLayoutNameA
GetWindowTextA
SetPropA
IntersectRect
GetClassLongA
GetMenuItemCount
GetSystemMenu
wsprintfA
DrawTextA
GetKeyboardState
GetSubMenu
CheckMenuItem
CreateIcon
EnumWindows
EnableScrollBar
RegisterClassA
GetLastActivePopup
SystemParametersInfoA
GetWindowThreadProcessId
CharUpperBuffA
SetScrollPos
BeginPaint
SetCursor
CharLowerA
KillTimer
DestroyWindow
GetMenuStringA
SetClassLongA
GetKeyboardLayout
DeleteMenu
IsWindowVisible
GetKeyNameTextA
SetCapture
SetTimer
GetParent
DestroyCursor
GetWindowPlacement
RemoveMenu
OemToCharA
GetScrollPos
CharNextA
LoadStringA
GetMenu
GetWindowDC
UnhookWindowsHookEx
SetWindowTextA
RemovePropA
MoveWindow
GetScrollRange
CallWindowProcA
EndPaint
ReleaseCapture
WindowFromPoint
TranslateMDISysAccel
ReleaseDC
PeekMessageA
ScrollWindow
GetDC
SetMenuItemInfoA
PtInRect
UpdateWindow
SetWindowPos
InsertMenuItemA
CreateMenu
MsgWaitForMultipleObjects
GetActiveWindow
DrawMenuBar
MessageBoxA
LoadCursorA
EnableMenuItem
IsWindow
DrawEdge
ShowScrollBar
SetActiveWindow
MapWindowPoints
ShowOwnedPopups
PostMessageA
GetDCEx
LoadKeyboardLayoutA
GetClientRect
DestroyMenu
GetKeyboardLayoutList
RegisterClipboardFormatA
SetParent
IsIconic
LoadIconA
EqualRect
DestroyIcon
GetMenuItemInfoA
ClientToScreen
EnumThreadWindows
AdjustWindowRectEx
FindWindowA
SetScrollRange
MapVirtualKeyA
InsertMenuA
LoadBitmapA
CharNextW
InflateRect
GetTopWindow
GetWindowLongW
ChildWindowFromPoint
DefMDIChildProcA
DefWindowProcA
GetDlgItem
SetWindowsHookExA
DispatchMessageA
InvalidateRect
SetScrollInfo
SetForegroundWindow
GetPropA
RegisterWindowMessageA
DrawIcon
FrameRect
CloseClipboard
FillRect
EmptyClipboard
SetMenu
GetCapture
OpenClipboard
DrawFrameControl
DrawIconEx
IsDialogMessageW
CreateWindowExA
GetSystemMetrics
ActivateKeyboardLayout
GetForegroundWindow
SetFocus
GetWindowLongA
DrawAnimatedRects
TranslateMessage
ShowWindow
GetClassInfoA
SetRect
SendMessageA
RedrawWindow
WaitMessage
SetWindowLongA
DefFrameProcA
GetDesktopWindow
CreatePopupMenu
Sections
CODE Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 446B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 531B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ