Static task
static1
Behavioral task
behavioral1
Sample
e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118
-
Size
190KB
-
MD5
e42a6b469f9e3d06fd713b5d71397e1b
-
SHA1
02a4dcda334a92c8d8352d245c4c66117fbb4e24
-
SHA256
f462384cd178f857f02a49b1020789b361a7a4f18f77f383d5b05de0b5e3830e
-
SHA512
a43f3ef2ac5212034c64ca57b8942729e76df503425d29dcd31e26932753bf01c6b6cf058fc76c6a8e7c5c606c89d1c42d5ea6b433db085198011f0e72c5da76
-
SSDEEP
3072:fuB0MNkbgivhzSKtcoe+Z8Io5JSlnZFCFVmIWQj16Wqp+EOlv:fuHSbgivh+TvIo5JSlnCz5WQRtq0EOJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118
Files
-
e42a6b469f9e3d06fd713b5d71397e1b_JaffaCakes118.exe windows:4 windows x86 arch:x86
5a06d93adb569e70b0302f99db2b32d5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetFileTitleW
oledlg
OleUIBusyW
shlwapi
PathIsUNCW
PathFindFileNameW
PathRemoveFileSpecW
PathFileExistsW
PathFindExtensionW
PathStripToRootW
PathAppendW
user32
WinHelpW
CharUpperW
GetMessagePos
CopyAcceleratorTableW
GetPropW
IsWindow
IntersectRect
GetClientRect
IsRectEmpty
SetActiveWindow
CreateWindowExW
GetMessageTime
AdjustWindowRectEx
IsIconic
GetNextDlgTabItem
EqualRect
GetNextDlgGroupItem
GetClassLongW
MapWindowPoints
GetClassInfoW
OffsetRect
MessageBeep
SetForegroundWindow
GetTopWindow
CharNextW
GetClassInfoExW
SetPropW
UpdateWindow
InvalidateRect
LoadIconW
GetWindowPlacement
RemovePropW
RegisterWindowMessageW
DefWindowProcW
CallWindowProcW
SetRect
GetForegroundWindow
RegisterClassW
InvalidateRgn
SendDlgItemMessageA
GetMenu
IsChild
DestroyMenu
advapi32
RegCreateKeyExW
RegQueryValueW
RegQueryInfoKeyW
RegOpenKeyW
RegDeleteKeyW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegEnumKeyW
RegSetValueExW
RegQueryValueExW
kernel32
InterlockedExchange
DeleteCriticalSection
WaitForSingleObject
GetVersion
FindFirstFileW
GetCurrentProcessId
GetThreadLocale
GetCalendarInfoA
GetProcAddress
CloseHandle
GetModuleFileNameW
RemoveDirectoryW
SystemTimeToFileTime
FindResourceW
FindNextFileW
DeleteFileW
SetFilePointer
lstrcpyW
GetThreadContext
LocalFileTimeToFileTime
GetModuleHandleW
WriteFile
EnumResourceNamesA
GetLocaleInfoA
RaiseException
LockResource
ReadFile
GetLocaleInfoW
CreateDirectoryW
EnumResourceLanguagesW
CreateMutexW
WideCharToMultiByte
CreateFileW
FindClose
InitializeCriticalSection
GetACP
ExitProcess
MultiByteToWideChar
LoadResource
ConvertDefaultLocale
GetFileAttributesW
InterlockedDecrement
MoveFileW
GetSystemDefaultLangID
GetVersionExW
SizeofResource
FreeLibrary
lstrcmpiA
ReleaseMutex
GetCurrentDirectoryW
VirtualFree
LoadLibraryW
SetFileTime
lstrcmpA
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
shell32
SHCreateDirectoryExW
SHGetSpecialFolderPathW
ole32
CLSIDFromProgID
OleUninitialize
CoTaskMemFree
CoTaskMemAlloc
CoRegisterMessageFilter
StgCreateDocfileOnILockBytes
CoInitialize
CoCreateInstance
OleIsCurrentClipboard
CoGetClassObject
OleInitialize
OleFlushClipboard
CreateILockBytesOnHGlobal
CoRevokeClassObject
StgOpenStorageOnILockBytes
CoFreeUnusedLibraries
CoUninitialize
CLSIDFromString
gdi32
RestoreDC
OffsetViewportOrgEx
ScaleViewportExtEx
PtVisible
SelectObject
GetTextColor
SetMapMode
SetBkColor
SetViewportExtEx
ExtSelectClipRgn
GetWindowExtEx
Escape
CreateBitmap
ExtTextOutW
DeleteDC
SetViewportOrgEx
GetStockObject
GetRgnBox
DeleteObject
GetBkColor
GetObjectW
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
RectVisible
TextOutW
GetDeviceCaps
SaveDC
SetTextColor
GetMapMode
GetViewportExtEx
CreateRectRgnIndirect
Sections
.text Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ