Static task
static1
Behavioral task
behavioral1
Sample
f3f4f49cfffc5ccf71b781b21747562d_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
f3f4f49cfffc5ccf71b781b21747562d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f3f4f49cfffc5ccf71b781b21747562d_JaffaCakes118
-
Size
160KB
-
MD5
f3f4f49cfffc5ccf71b781b21747562d
-
SHA1
81df55dae2b19c7dd8b153f67e9528ab5567a2fb
-
SHA256
240608cc48658149ad419076c8ce79eaed180780256e7ea4c8189c2308f7cdb0
-
SHA512
5ad32eb867f590c50574ef60e2e2419e10aad96a663d636eec214e3f0158cb910ff6fd92e3d4ff0f689dceb2216f59df369efcb0e53dfbd2baec7da340aa27de
-
SSDEEP
3072:fo0yOZZiY3qqls4vc1X5NVbvBgrSfD4TaIMXO4hcZOLReOW:fpycZd3Vls4vcxnVbvBgOf0O7W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f3f4f49cfffc5ccf71b781b21747562d_JaffaCakes118
Files
-
f3f4f49cfffc5ccf71b781b21747562d_JaffaCakes118.exe windows:4 windows x86 arch:x86
7a082799e531facb18c15956f3253aa0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
lstrcatW
CreateFileW
GetWindowsDirectoryW
VirtualAllocEx
LoadLibraryA
GetProcAddress
lstrcmp
SetThreadLocale
GetProfileSectionW
GetDriveTypeA
FindNextFileW
GetCommConfig
FindAtomW
GetCommandLineW
LocalCompact
SwitchToFiber
WriteConsoleOutputAttribute
CloseHandle
SetHandleCount
OpenWaitableTimerW
WriteFile
WaitNamedPipeW
SetUnhandledExceptionFilter
DnsHostnameToComputerNameA
QueryDosDeviceA
MulDiv
SetConsoleCursorPosition
GlobalGetAtomNameW
SetSystemTime
DeleteTimerQueueTimer
GetTimeZoneInformation
MultiByteToWideChar
SetFileAttributesA
SetComputerNameExA
GetFileType
EnumDateFormatsExA
GetConsoleAliasesLengthA
GetCurrentDirectoryW
SetProcessAffinityMask
CreateJobObjectA
EnumUILanguagesW
GetProcessWorkingSetSize
CreateProcessA
DeleteCriticalSection
OpenFileMappingA
SwitchToThread
FindResourceW
EnumResourceTypesA
SetConsoleTitleA
SetConsoleCtrlHandler
InitializeCriticalSection
GetTapeParameters
HeapWalk
FindFirstFileExA
lstrcpyW
HeapFree
GetShortPathNameA
GlobalHandle
ContinueDebugEvent
GlobalMemoryStatusEx
GetConsoleAliasExesLengthW
TlsAlloc
GlobalFix
AddAtomA
AddAtomW
DeleteFiber
QueryDosDeviceW
UpdateResourceA
WriteConsoleA
CreateEventA
TlsSetValue
GetStringTypeExA
FreeEnvironmentStringsA
EnumSystemLanguageGroupsA
GetUserDefaultUILanguage
ReadProcessMemory
GetProfileStringW
GetTempPathA
FindFirstChangeNotificationA
ReadDirectoryChangesW
ClearCommBreak
FreeConsole
GetDefaultCommConfigW
ReadConsoleOutputAttribute
SetProcessPriorityBoost
SetFilePointer
GetConsoleDisplayMode
ReadConsoleOutputA
GlobalSize
DeleteVolumeMountPointW
MoveFileWithProgressW
GetProfileIntW
GetModuleHandleW
GetCurrentProcessId
IsDBCSLeadByteEx
QueryPerformanceFrequency
UnregisterWaitEx
GetOverlappedResult
CreateDirectoryW
SleepEx
user32
DrawTextA
RemovePropA
LookupIconIdFromDirectory
WinHelpA
TranslateMessage
ShowWindow
wvsprintfA
SendMessageA
ReleaseCapture
OpenDesktopA
CascadeChildWindows
OpenWindowStationW
MessageBoxIndirectW
EnumDisplayDevicesA
SetRectEmpty
MapVirtualKeyA
CloseWindow
SendIMEMessageExW
NotifyWinEvent
ModifyMenuW
CheckMenuRadioItem
MessageBoxExA
GetDialogBaseUnits
PeekMessageW
SwitchToThisWindow
GetForegroundWindow
GetClassNameA
SetMessageQueue
SetWindowsHookExA
WaitMessage
EnumPropsExW
DrawMenuBar
BroadcastSystemMessageW
CreateDesktopW
GetOpenClipboardWindow
LoadMenuA
GetWindowTextLengthW
PostThreadMessageW
OffsetRect
CharToOemBuffA
SetMenuItemBitmaps
EndDeferWindowPos
DdeConnectList
CharUpperA
SetTimer
RemoveMenu
SetDoubleClickTime
GetMenuItemCount
SetThreadDesktop
SetCursor
SubtractRect
InSendMessage
CreateAcceleratorTableA
GetScrollBarInfo
DeregisterShellHookWindow
GetDlgItemTextW
GetClipboardFormatNameW
CallMsgFilterA
CopyAcceleratorTableA
UpdateWindow
CopyRect
GetNextDlgTabItem
VkKeyScanExA
CopyImage
SetSysColors
GetInputState
SetCursorPos
GetClientRect
EnableWindow
RegisterWindowMessageW
GetMenuStringA
ActivateKeyboardLayout
CreateMenu
GetTabbedTextExtentW
DrawAnimatedRects
CharUpperW
SendIMEMessageExA
SetPropA
GetPriorityClipboardFormat
GetMessageA
DefFrameProcW
RegisterHotKey
PostQuitMessage
GetDC
GetWindowRgn
RealChildWindowFromPoint
GetKeyboardLayoutNameA
CreateWindowStationW
DdeUninitialize
DestroyCursor
IsCharLowerA
SendMessageCallbackA
comdlg32
ReplaceTextW
ChooseFontW
GetOpenFileNameW
GetSaveFileNameW
PrintDlgExA
FindTextW
PageSetupDlgA
ChooseColorW
PrintDlgExW
FindTextA
CommDlgExtendedError
GetFileTitleA
GetSaveFileNameA
PageSetupDlgW
PrintDlgA
GetFileTitleW
ChooseFontA
ReplaceTextA
GetOpenFileNameA
ChooseColorA
advapi32
RegCloseKey
shell32
SHGetDesktopFolder
ExtractIconEx
DuplicateIcon
SHPathPrepareForWriteA
CommandLineToArgvW
ShellHookProc
DragQueryFileA
ShellExecuteEx
DragFinish
SHGetFileInfo
Shell_NotifyIcon
SHBrowseForFolder
SHGetDiskFreeSpaceExW
SHBindToParent
SHGetSpecialFolderPathW
SHGetSettings
SHGetDataFromIDListA
SHChangeNotify
ExtractIconW
SHGetInstanceExplorer
SHGetPathFromIDList
SHQueryRecycleBinW
DragQueryFile
SHFreeNameMappings
ExtractIconA
DragQueryFileAorW
DragAcceptFiles
SHGetPathFromIDListA
SHInvokePrinterCommandW
Shell_NotifyIconA
SHBrowseForFolderW
SHGetFolderLocation
SHAppBarMessage
ExtractAssociatedIconW
SHGetFileInfoA
SHGetPathFromIDListW
SHGetDiskFreeSpaceExA
SHPathPrepareForWriteW
SHFileOperation
ShellExecuteExW
Shell_NotifyIconW
SHLoadNonloadedIconOverlayIdentifiers
WOWShellExecute
ExtractIconExA
SHFormatDrive
SHGetDataFromIDListW
ShellAboutW
SHGetIconOverlayIndexW
SHQueryRecycleBinA
SHGetFileInfoW
SHCreateDirectoryExA
SHGetSpecialFolderLocation
SHFileOperationW
SHGetFolderPathW
SHBrowseForFolderA
SHGetIconOverlayIndexA
SHEmptyRecycleBinA
DragQueryPoint
shlwapi
StrChrW
StrStrW
StrCmpNW
StrRStrIA
StrRStrIW
StrRChrW
StrChrIA
StrChrIW
StrCmpNIW
StrChrA
StrStrIW
StrRChrIW
StrStrIA
Sections
.text Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ