Static task
static1
Behavioral task
behavioral1
Sample
dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
dc56ff2ad208373e7894272128dcfd13_JaffaCakes118
-
Size
332KB
-
MD5
dc56ff2ad208373e7894272128dcfd13
-
SHA1
492b49938fe3b9477d9f650ea81ea44e1bce2c79
-
SHA256
1ec6d16bb03201b4bb5bf1f2912a037e9f0470b9037e04a1cd40081887ad4f0a
-
SHA512
a944e27f309f003e392104bcfb54bb165793c049bc6cddf562296136038571602abcad2ebfb3d20ad62abbb02f95f0954718da052e6b90d05d2fb6873ca7dafe
-
SSDEEP
6144:tBRwPAvE5Ugv5yEMhQzwKSPKx+f2DmkAKLYmbCT597:tCWacQlSPGhmkx0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dc56ff2ad208373e7894272128dcfd13_JaffaCakes118
Files
-
dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe windows:4 windows x86 arch:x86
77640ea49477065bd8768a04dc19f05c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
sinh
_initterm
__getmainargs
_acmdln
tanh
_CIasin
cos
_onexit
__dllonexit
__setusermatherr
towlower
advapi32
BuildTrusteeWithNameA
CreateProcessAsUserA
SetNamedSecurityInfoA
GetTrusteeTypeA
BuildImpersonateTrusteeA
GetServiceDisplayNameA
NotifyBootConfigStatus
SetServiceStatus
oleaut32
LPSAFEARRAY_UserMarshal
VARIANT_UserFree
LPSAFEARRAY_UserFree
LPSAFEARRAY_UserSize
mpr
WNetAddConnectionA
user32
RemoveMenu
SendInput
MapVirtualKeyExW
CreateDialogParamA
GetDlgItemTextA
FrameRect
GetWindowTextLengthA
GetWindowTextA
CharUpperBuffW
SystemParametersInfoA
GetMenuItemCount
GetClipCursor
GetDoubleClickTime
GetMessageA
DialogBoxParamA
DestroyMenu
GetTabbedTextExtentA
CharNextA
IntersectRect
CreateDialogIndirectParamW
DefWindowProcA
IsCharAlphaNumericA
CharLowerA
GetWindow
GetSysColorBrush
GetParent
SetClassLongW
GetClipboardData
ShowCaret
SetActiveWindow
LoadImageA
GetMenu
SetForegroundWindow
IsMenu
GetClipboardFormatNameW
GetClipboardViewer
SendDlgItemMessageA
CharUpperW
EmptyClipboard
SetPropA
PeekMessageW
GetWindowThreadProcessId
LockWindowUpdate
LoadKeyboardLayoutW
GetProcessWindowStation
LoadMenuW
ShowWindow
DefDlgProcA
CharUpperA
DestroyAcceleratorTable
ReleaseDC
RegisterClassExW
LoadIconA
DdeFreeStringHandle
GetKeyboardLayoutNameW
GetDlgItem
DdeClientTransaction
LoadStringW
SetWindowRgn
GetClassInfoW
CloseWindow
GetWindowModuleFileNameA
UnionRect
FillRect
GetScrollRange
InvalidateRect
PostThreadMessageW
AttachThreadInput
MapVirtualKeyW
FindWindowExA
VkKeyScanExA
GetDlgCtrlID
GetMessagePos
GetClassInfoExW
PtInRect
CopyIcon
CreateWindowStationW
SetRectEmpty
SetWindowPos
DrawIconEx
DialogBoxIndirectParamA
WaitMessage
ToAscii
CharPrevW
TrackPopupMenuEx
GetKeyboardState
LoadBitmapW
DialogBoxIndirectParamW
IsClipboardFormatAvailable
ChildWindowFromPointEx
EnableScrollBar
BringWindowToTop
GetForegroundWindow
IsCharAlphaW
DestroyCursor
GetSystemMetrics
wvsprintfA
EnumDisplaySettingsW
CharNextW
PostThreadMessageA
ReuseDDElParam
GetMenuItemID
CreateDialogIndirectParamA
SendMessageA
DdeConnectList
CreateIconFromResource
GetWindowLongA
GetUserObjectInformationW
GetScrollInfo
SetMenu
PostMessageA
SetDlgItemInt
CharLowerBuffA
GrayStringW
GetKeyState
GetClassNameW
SetWindowLongW
InsertMenuW
CopyAcceleratorTableW
SendDlgItemMessageW
VkKeyScanW
ShowScrollBar
WindowFromDC
EnumThreadWindows
CharLowerW
GetClassLongA
SetFocus
SetClassLongA
CharToOemA
AppendMenuW
DeferWindowPos
GetDlgItemInt
mouse_event
UnpackDDElParam
IsWindow
CheckRadioButton
SetClipboardData
EnableWindow
GetCursorPos
CallMsgFilterA
SetCaretBlinkTime
SetWindowTextA
ScrollWindow
ModifyMenuA
BlockInput
LoadMenuA
GetWindowLongW
SetWindowTextW
SetDlgItemTextW
mfc42
ord4698
ord1027
ord2725
ord5302
ord1037
ord3346
ord2396
ord1029
ord1089
ord3922
ord5731
ord1063
ord2554
ord4486
ord6375
ord5307
ord1168
ord1576
ord1055
ord561
ord3738
ord815
ord5714
ord4424
ord1089
ord4080
ord3079
ord3825
ord3831
ord3830
ord1004
ord2976
ord3081
ord2985
ord3262
ord1067
ord4465
ord3259
ord1085
ord2982
ord1092
Sections
.text Size: 212KB - Virtual size: 211KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ