Static task
static1
Behavioral task
behavioral1
Sample
55c6a6de4705c21b23e7789679ea3f2a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55c6a6de4705c21b23e7789679ea3f2a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
55c6a6de4705c21b23e7789679ea3f2a_JaffaCakes118
-
Size
172KB
-
MD5
55c6a6de4705c21b23e7789679ea3f2a
-
SHA1
5c0f25d0ee7a82868290223b55962e2ad0f113a0
-
SHA256
f3ce46c116670b3d8646bda218c42a1793b504866a2a72ed2197d3037752221d
-
SHA512
3cdd563be5c870aae2c936ed976ef5912c075f304eb87eb3bf642c14d78d0ca49260feb1b15cbcffbacda31da7bb1c97faf5a23f5e6a9acf677396ff065f6f30
-
SSDEEP
3072:do/5kG+tU/eTE0Tho5/T7yFAJ1atRUN3tk1dfJ7v3DK8tDPAqLX+w5XND:dALF/eTEbRT7yhUNdk3RnKADInwD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 55c6a6de4705c21b23e7789679ea3f2a_JaffaCakes118
Files
-
55c6a6de4705c21b23e7789679ea3f2a_JaffaCakes118.exe windows:4 windows x86 arch:x86
e9971651ab298894959b43a100e48f9f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempFileNameA
GetThreadPriority
GetPrivateProfileSectionNamesA
SetConsoleNumberOfCommandsA
IsValidCodePage
WriteConsoleA
PrepareTape
FindFirstVolumeMountPointW
SetFileAttributesA
GetTapePosition
LocalLock
OpenProcess
GetExitCodeProcess
HeapSize
GetFileSize
GetExpandedNameA
EnumResourceTypesA
WritePrivateProfileStringA
CloseHandle
RemoveDirectoryA
ReadConsoleOutputCharacterA
GetWindowsDirectoryA
GetConsoleCursorInfo
VirtualAlloc
ConnectNamedPipe
EnumResourceTypesA
GetFileAttributesA
DuplicateHandle
CreateTimerQueueTimer
MoveFileWithProgressA
IsBadHugeReadPtr
GetSystemTimes
BeginUpdateResourceA
CreateDirectoryA
SetInformationJobObject
ClearCommBreak
SetProcessPriorityBoost
SetFileShortNameA
GetProcessId
GetPrivateProfileSectionNamesW
GetCurrentProcessId
GetConsoleAliasesLengthA
GetComputerNameExA
LZClose
LZCloseFile
FlushViewOfFile
SetComputerNameExA
GetFileTime
GetCommState
ClearCommError
IsBadHugeWritePtr
VirtualAllocEx
SetCommMask
FreeLibrary
FreeEnvironmentStringsA
EnumResourceLanguagesA
GetExitCodeThread
PulseEvent
GetCompressedFileSizeA
FindResourceA
LocalFlags
SetThreadExecutionState
WriteConsoleOutputA
GetModuleFileNameA
GetTempPathA
HeapSize
CreateMutexA
GlobalGetAtomNameA
ReadConsoleA
GetProcessHeaps
lstrlen
ResetEvent
LocalUnlock
WideCharToMultiByte
GetDiskFreeSpaceA
AddConsoleAliasA
ReleaseMutex
GetPrivateProfileStringA
WriteConsoleInputA
GetProcessShutdownParameters
GetFileType
GetTempPathA
GetUserDefaultUILanguage
WaitForMultipleObjects
SetLocaleInfoA
ChangeTimerQueueTimer
ProcessIdToSessionId
SetEvent
ReadConsoleA
GetAtomNameA
OpenWaitableTimerA
GetConsoleCursorMode
LocalAlloc
MoveFileExA
winmm
timeGetSystemTime
user32
EqualRect
ArrangeIconicWindows
AdjustWindowRect
RegisterUserApiHook
ExitWindowsEx
GetClassNameA
LoadCursorA
GetScrollInfo
GetWindowTextA
GetRawInputDeviceInfoA
GetWindowTextA
UnregisterClassA
LoadLocalFonts
TileChildWindows
PeekMessageA
RemovePropA
GetMenuCheckMarkDimensions
UnionRect
CreateAcceleratorTableA
DeregisterShellHookWindow
DefWindowProcA
ReplyMessage
DlgDirListComboBoxA
ToUnicodeEx
ScreenToClient
EnumDisplayMonitors
AllowForegroundActivation
GetRegisteredRawInputDevices
ChangeDisplaySettingsExW
SetClassWord
SetWindowsHookA
CreatePopupMenu
SetWindowsHookExA
SetSystemMenu
GetWindowModuleFileNameA
SetLastErrorEx
DestroyReasons
ToAscii
SetClassWord
RealChildWindowFromPoint
CharLowerBuffA
EnumDesktopWindows
ReplyMessage
GetMessagePos
GetClassInfoExA
CallMsgFilter
ChangeDisplaySettingsExA
EnumDisplayMonitors
GetMenuState
IsCharAlphaNumericA
PostQuitMessage
GetMenuItemInfoA
CallWindowProcA
DrawCaption
DlgDirSelectComboBoxExA
ShowStartGlass
SetWindowsHookExA
SetActiveWindow
GetLayeredWindowAttributes
UnloadKeyboardLayout
HideCaret
ShowStartGlass
CharLowerA
BroadcastSystemMessageA
GetUserObjectInformationA
DrawFrame
FindWindowA
GetOpenClipboardWindow
MessageBoxIndirectA
InsertMenuItemA
EndTask
MessageBoxTimeoutW
CharUpperBuffA
GetMessageTime
DlgDirListComboBoxA
GetRawInputData
CharToOemBuffA
MessageBoxA
DeregisterShellHookWindow
CharUpperBuffA
MessageBoxA
MessageBoxIndirectA
IsCharAlphaA
CallWindowProcA
IsDlgButtonChecked
CopyAcceleratorTableA
GetParent
CallWindowProcA
Sections
.idata Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.itext Size: 156KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ