Static task
static1
Behavioral task
behavioral1
Sample
f111aae2ce78b0840de1f3bac69d24e6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f111aae2ce78b0840de1f3bac69d24e6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f111aae2ce78b0840de1f3bac69d24e6_JaffaCakes118
-
Size
181KB
-
MD5
f111aae2ce78b0840de1f3bac69d24e6
-
SHA1
0963e1ea55fc6ac1ad236a3a5f2ce6f58d64afab
-
SHA256
b0ba3423b7b0d73a4368019fc9ed4b25644514831002a7306500c01acd7586d6
-
SHA512
a8e8a08779a4a8b95ec28959732a3c82d454884c35d23937a1f0b8a19cc11afc7d578e948493b4e86e8bf3e17acd2aa3349f75181e1480c46d40a03c5ad2f889
-
SSDEEP
3072:y54t+JTOUTR2exK7EXwxQGDnEgShG+kGBmYopWjFYRKNF/CqSfNXsO:y54IJTXKKy5DUVVcnfpNX7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f111aae2ce78b0840de1f3bac69d24e6_JaffaCakes118
Files
-
f111aae2ce78b0840de1f3bac69d24e6_JaffaCakes118.exe windows:4 windows x86 arch:x86
a8d999a106f362e6e1e4acb1b39fd3c8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MapWindowPoints
SetForegroundWindow
SetFocus
CloseClipboard
MapVirtualKeyW
GetClipboardData
DeferWindowPos
GetWindowTextW
SetTimer
GetDCEx
CreatePopupMenu
LoadImageW
EmptyClipboard
GetCursorPos
SetCaretPos
GetMessageW
wsprintfW
CreateAcceleratorTableW
GetSystemMenu
CreateIconIndirect
PeekMessageW
SetMenu
GetClientRect
DestroyWindow
CopyAcceleratorTableW
IsWindowVisible
IsChild
GetParent
MoveWindow
ClientToScreen
RegisterClipboardFormatW
SetCursor
IsWindow
SetRect
IsZoomed
CreateCaret
OpenClipboard
IsCharLowerW
IntersectRect
EnableWindow
DrawStateW
GetDlgItem
ReleaseCapture
DragDetect
PostMessageW
GetIconInfo
DestroyCaret
IsMenu
PtInRect
DrawTextW
EnableScrollBar
RedrawWindow
GetMenuItemCount
GetMenuItemID
GetKeyNameTextW
SetParent
DrawIconEx
DrawIcon
GetDC
SetWindowsHookExW
AppendMenuW
mouse_event
CopyIcon
BeginDeferWindowPos
GetWindowPlacement
SetWindowPos
GrayStringW
CallNextHookEx
GetTabbedTextExtentW
GetMenuState
SetWindowLongW
SetRectEmpty
GetScrollPos
LoadIconW
GetLastActivePopup
GetScrollInfo
EnableMenuItem
LoadBitmapW
GetWindowRect
GetSysColorBrush
TrackPopupMenu
DestroyCursor
DrawTextExW
CallWindowProcW
IsRectEmpty
GetKeyboardLayout
KillTimer
GetWindowLongW
InvalidateRect
UnionRect
GetMenuItemInfoW
GetCapture
LoadMenuW
LockWindowUpdate
ShowWindow
SetCapture
SetScrollPos
GetMessagePos
GetSystemMetrics
GetSysColor
GetDlgCtrlID
UpdateWindow
DrawEdge
SetMenuDefaultItem
IsClipboardFormatAvailable
UnhookWindowsHookEx
GetMenu
GetCursor
RegisterWindowMessageW
GetNextDlgTabItem
SetActiveWindow
SendMessageW
DestroyAcceleratorTable
CopyRect
GetFocus
EndDeferWindowPos
ShowScrollBar
SystemParametersInfoW
WindowFromPoint
LoadCursorW
GetSubMenu
GetWindow
GetDesktopWindow
SystemParametersInfoA
HideCaret
FillRect
SetClipboardData
TabbedTextOutW
GetActiveWindow
GetForegroundWindow
DrawAnimatedRects
DrawFrameControl
CheckMenuItem
GetMenuDefaultItem
FindWindowW
GetClassNameW
ReleaseDC
SetCursorPos
IsIconic
InflateRect
MessageBeep
DeleteMenu
DispatchMessageW
ShowCaret
InsertMenuW
ScreenToClient
GetKeyState
GetClassLongW
EqualRect
TranslateMessage
SetScrollInfo
EnumChildWindows
MapVirtualKeyExW
CloseWindow
OffsetRect
DrawFocusRect
SetWindowRgn
DestroyIcon
BringWindowToTop
DestroyMenu
ole32
DoDragDrop
CoCreateInstance
OleRun
kernel32
LockResource
GetModuleHandleW
GetVersionExA
QueryDosDeviceA
InterlockedIncrement
GetNumberFormatW
LoadResource
LoadLibraryExW
Sleep
CloseHandle
GetTickCount
CreateThread
GetSystemTimeAsFileTime
GetPrivateProfileIntW
WaitForSingleObject
FileTimeToLocalFileTime
InitializeCriticalSection
QueryPerformanceCounter
WritePrivateProfileStringW
MultiByteToWideChar
InterlockedExchange
GetLocaleInfoW
GetProcessId
InterlockedDecrement
GetLastError
LocalFree
GetCurrentDirectoryW
GetThreadLocale
GetLocaleInfoA
FindCloseChangeNotification
GetPrivateProfileStringW
GetVersion
SetThreadPriority
EnumResourceTypesA
GlobalLock
MulDiv
FindFirstChangeNotificationW
WideCharToMultiByte
GlobalAlloc
LoadLibraryW
FileTimeToSystemTime
ExitProcess
DeleteCriticalSection
FindClose
FindFirstFileW
SetFileAttributesW
GetCurrentThreadId
FreeLibrary
lstrlenW
lstrcmpW
LoadLibraryA
GlobalUnlock
GetProcAddress
lstrcpyW
FindNextChangeNotification
DeleteFileW
FindResourceW
ResumeThread
GlobalFree
lstrcpynW
GetModuleFileNameW
GetACP
GetFileAttributesW
GlobalSize
GetVersionExW
GetCurrentProcessId
gdi32
Rectangle
SetPixelV
GetBkColor
GetTextExtentPoint32W
CreateDIBSection
shell32
SHGetDesktopFolder
SHBrowseForFolderW
ShellExecuteExW
ShellExecuteW
SHAppBarMessage
SHGetPathFromIDListW
DragAcceptFiles
SHGetFileInfoW
SHGetSpecialFolderLocation
SHGetMalloc
Shell_NotifyIconW
gdiplus
GdipCreateHBITMAPFromBitmap
GdipCloneImage
advapi32
RegSetValueExW
RegOpenKeyW
RegEnumKeyExW
RegDeleteKeyW
RegDeleteValueW
RegOpenKeyExW
RegCreateKeyExW
RegEnumValueW
RegQueryValueExW
RegCloseKey
comctl32
ImageList_LoadImageW
ImageList_GetImageInfo
ImageList_Add
PropertySheetW
ImageList_GetIcon
ImageList_ReplaceIcon
_TrackMouseEvent
ImageList_Destroy
ImageList_AddMasked
ImageList_GetImageCount
InitCommonControlsEx
ImageList_Draw
Sections
.text Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ