Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7bafaadc0a46d5b9651cac5a97ea7f20.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7bafaadc0a46d5b9651cac5a97ea7f20.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_7bafaadc0a46d5b9651cac5a97ea7f20
-
Size
266KB
-
MD5
7bafaadc0a46d5b9651cac5a97ea7f20
-
SHA1
8f61505ce3fcde5f7d002b27631c705b277d80dc
-
SHA256
782473ee76b966f6664e97cd366dbc3b8684da969049e1d4c45de1635c7bd95f
-
SHA512
11c24207c97ed749cd2120669aa9b794e09bdaee5b1c58fc8bbf76ed396be680f579b427cd8ce356ed0b0c2196109970efb4a0f62f4431c93d37f75edc8a6a13
-
SSDEEP
6144:m5yCwdzE+tQ8ec+C9cMLnQsMm0+j/3vyO2y8VsolFn:WypzE2j9cMssMm0O78muFn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_7bafaadc0a46d5b9651cac5a97ea7f20
Files
-
JaffaCakes118_7bafaadc0a46d5b9651cac5a97ea7f20.exe windows:4 windows x86 arch:x86
503409847ea7cce677dad1fc98cf9eb0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VarUI4FromStr
user32
GetDlgCtrlID
CreateWindowExW
DrawIconEx
GetWindow
CreateDialogIndirectParamW
LoadImageW
CopyRect
CallWindowProcW
GetMenu
GetSystemMetrics
EnableWindow
SetDlgItemTextW
DialogBoxParamW
SetFocus
SystemParametersInfoW
FindWindowW
GetMonitorInfoW
SetWindowLongW
GetKeyState
MapWindowPoints
SetForegroundWindow
CharNextW
DestroyWindow
SendMessageTimeoutW
KillTimer
DefWindowProcW
WindowFromPoint
LoadCursorW
DrawFocusRect
IsIconic
DispatchMessageW
GetClientRect
ReleaseDC
SendMessageW
GetWindowRect
SetScrollInfo
SetCursor
DeferWindowPos
ClientToScreen
UnregisterClassA
LoadStringW
GetTopWindow
GetClassInfoExW
PostMessageW
WindowFromDC
ScreenToClient
InvalidateRect
ScrollWindowEx
BeginPaint
DrawTextW
GetDlgItem
FindWindowExW
GetSystemMenu
LoadIconW
FillRect
RedrawWindow
PtInRect
IsWindow
SetWindowPos
GetForegroundWindow
GetIconInfo
GetWindowThreadProcessId
AttachThreadInput
EnableMenuItem
SetTimer
BeginDeferWindowPos
GetSysColor
GetWindowLongW
EndDeferWindowPos
TranslateMessage
GetDesktopWindow
IntersectRect
GetParent
AdjustWindowRectEx
SetRect
EndPaint
GetMessageW
wsprintfW
DestroyIcon
SetWindowTextW
GetDC
MonitorFromRect
EndDialog
ShowWindow
EqualRect
PeekMessageW
RegisterClassExW
GetAncestor
UpdateWindow
GetNextDlgTabItem
MonitorFromWindow
GetScrollInfo
GetCursorPos
GetWindowTextW
gdi32
CreateDCW
GetClipBox
CreateBitmap
GetObjectW
Rectangle
SelectObject
BitBlt
SetBkMode
SetWindowOrgEx
GetTextExtentPoint32W
TextOutW
SetBkColor
GetStockObject
CreateCompatibleDC
CreateSolidBrush
GetTextMetricsW
SetTextJustification
DeleteObject
GetMapMode
DeleteDC
SetMapMode
StretchBlt
CreateFontIndirectW
DPtoLP
GetDeviceCaps
SetTextColor
EnumFontFamiliesExW
CreateCompatibleBitmap
SetTextAlign
ole32
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
comctl32
InitCommonControlsEx
kernel32
FreeLibrary
GetSystemTimeAsFileTime
IsDebuggerPresent
GetModuleHandleW
LoadResource
lstrlenA
LockResource
EnterCriticalSection
ReleaseMutex
GetCurrentThreadId
LoadLibraryExW
CloseHandle
GetACP
lstrcmpiW
CreateFileW
GetProcessHeap
VirtualFree
FindResourceW
FreeResource
DeleteCriticalSection
SetLastError
FindResourceExW
SizeofResource
LeaveCriticalSection
GetFileSize
RaiseException
FlushInstructionCache
HeapFree
MulDiv
HeapAlloc
OutputDebugStringW
VirtualAlloc
IsProcessorFeaturePresent
ReadFile
HeapSize
LocalAlloc
UnhandledExceptionFilter
HeapReAlloc
HeapDestroy
lstrlenW
CreateMutexW
WideCharToMultiByte
SetUnhandledExceptionFilter
CreateThread
VirtualAllocEx
esent
JetStopServiceInstance
JetCreateTableColumnIndex
JetDeleteTable
JetBeginExternalBackupInstance
JetResetTableSequential
JetEndSession
JetComputeStats
JetGetTableIndexInfo
JetRollback
JetResetSessionContext
JetCreateTableColumnIndex2
JetDetachDatabase
JetStopBackupInstance
kbdcz1
KbdLayerDescriptor
Sections
.gQnQ Size: 1KB - Virtual size: 6KB
IMAGE_SCN_MEM_READ
.cJWsCtP Size: 2KB - Virtual size: 21KB
IMAGE_SCN_MEM_READ
.rImQRKp Size: 1024B - Virtual size: 32KB
IMAGE_SCN_MEM_READ
.SvqVDAb Size: 512B - Virtual size: 9KB
IMAGE_SCN_MEM_READ
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.UAyg Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zHuo Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ubjrGV Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 257KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.JExHQ Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.FbIAYy Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 210KB - Virtual size: 210KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.DxneYo Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.IGrtN Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.OESSyXf Size: 512B - Virtual size: 457B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ