Static task
static1
Behavioral task
behavioral1
Sample
e897faf9395f8811218adb98c7b9b099_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e897faf9395f8811218adb98c7b9b099_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e897faf9395f8811218adb98c7b9b099_JaffaCakes118
-
Size
460KB
-
MD5
e897faf9395f8811218adb98c7b9b099
-
SHA1
016658be3991b34ca26c9d9f16c7aa85ce51c811
-
SHA256
33680d2a203f7620fd8fb3c05804c2a424bdd6b9dd848d508a8249cf13cbcb79
-
SHA512
6b2b1df6a33a8d4702a607a0c7aa8cecee1c856fe3c99bb152bd439437c44351c19de24296228ff61db3a1c297cc12d97d2b08080c065ee35182d25c975ce144
-
SSDEEP
6144:rytqqEY60ua62E7SDzyFp7eLfbVn2JcMubyB1hpZkfNpK8+44p1Y:rx0N62E7BiLfbl2Kdbke1H+FA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e897faf9395f8811218adb98c7b9b099_JaffaCakes118
Files
-
e897faf9395f8811218adb98c7b9b099_JaffaCakes118.exe windows:4 windows x86 arch:x86
8cd035feb4e9f5d210ed6d45309b2947
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
spiomgr
?RemoveUserPort@IOEventManager@@QAEXXZ
?isEmpty@IOEventManager@@QAEHXZ
?IsPrintJobRunning@IOEventManager@@QAEHXZ
?SuspendPolling@IOEventManager@@QAEXXZ
?ResumePolling@IOEventManager@@QAEXXZ
?StopPolling@IOEventManager@@QAEXXZ
?DeleteAll@IOEventManager@@QAEXXZ
?SetPrintJob@IOEventManager@@QAEHPAU_tabJobInfo@@@Z
??1IOEventManager@@UAE@XZ
??0IOEventManager@@QAE@PAUHWND__@@@Z
?SetBlackOnlySupportModel@IOEventManager@@QAEXH@Z
?SetBuyNowSupportModel@IOEventManager@@QAEXH@Z
?SetForceToCheckJobID@IOEventManager@@QAEXH@Z
?SetXMLSupportModel@IOEventManager@@QAEXPAD0@Z
smballoon
ClearBalloonButton
SetBar
SetPanelUIInfo
DestroyPanel
HidePanel
SetBalloonButton
SetPanelButton
ShowPanel
SetForegroundPanel
ClearBar
SetFontCharSet
CreatePanel
kernel32
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
FindClose
FindFirstFileA
GetVolumeInformationA
GetFullPathNameA
GetThreadLocale
GetFileAttributesA
GetFileSize
GetFileTime
SetErrorMode
FileTimeToSystemTime
FileTimeToLocalFileTime
ReadFile
RtlUnwind
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
RaiseException
SetStdHandle
GetFileType
TerminateProcess
HeapReAlloc
HeapSize
GetACP
GetTimeZoneInformation
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
CreateFileA
GetCurrentProcess
DuplicateHandle
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
SizeofResource
GlobalFlags
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CloseHandle
GlobalAlloc
GetCurrentThread
lstrcpynA
MulDiv
SetLastError
GetVersion
GetProfileStringA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
FormatMessageA
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
Sleep
lstrcmpA
lstrlenA
lstrcmpiA
DeleteFileA
WinExec
CreateProcessA
GetVersionExA
LoadLibraryA
GetProcAddress
FreeLibrary
LocalAlloc
LocalFree
GetLastError
lstrcatA
lstrcpyA
GetPrivateProfileSectionA
ExitProcess
WritePrivateProfileStringA
GetModuleFileNameA
GetPrivateProfileStringA
GetPrivateProfileIntA
GetTickCount
user32
ValidateRect
TranslateMessage
GetMessageA
SetWindowContextHelpId
MapDialogRect
LoadStringA
GetClassNameA
PtInRect
GetSysColorBrush
CharUpperA
CharNextA
CopyAcceleratorTableA
SetRect
GetNextDlgGroupItem
MessageBeep
InflateRect
RegisterClipboardFormatA
PostThreadMessageA
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
GetFocus
SetFocus
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetClientRect
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
IsWindowVisible
GetCursorPos
GetTopWindow
MessageBoxA
IsChild
GetCapture
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
LoadIconA
LoadCursorA
ShowOwnedPopups
PostQuitMessage
BringWindowToTop
InvalidateRect
UnpackDDElParam
ReuseDDElParam
RegisterWindowMessageA
GetDesktopWindow
SetWindowRgn
SendMessageA
FindWindowA
PostMessageA
LoadImageA
EnableWindow
GetParent
wsprintfA
SetMenu
LoadMenuA
DestroyMenu
SetCursor
ReleaseCapture
TranslateAcceleratorA
LoadAcceleratorsA
SetRectEmpty
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
IsWindowUnicode
DefDlgProcA
DrawFocusRect
ExcludeUpdateRgn
ShowCaret
HideCaret
UnregisterClassA
WinHelpA
gdi32
SaveDC
RestoreDC
SelectObject
GetStockObject
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextColor
GetBkColor
DPtoLP
LPtoDP
GetMapMode
PatBlt
DeleteDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateDIBitmap
DeleteObject
CreateRectRgn
CreateSolidBrush
IntersectClipRect
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
comdlg32
GetFileTitleA
winspool.drv
EnumPortsA
EnumPrintersA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegCloseKey
RegEnumKeyA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
shell32
DragQueryFileA
DragFinish
comctl32
ord17
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoUninitialize
CoInitialize
CoCreateInstance
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
StgCreateDocfileOnILockBytes
CoRegisterMessageFilter
olepro32
ord253
oleaut32
SysStringLen
SysAllocString
VariantChangeType
VariantCopy
VariantTimeToSystemTime
SysAllocStringLen
SysStringByteLen
SysAllocStringByteLen
VariantClear
SysFreeString
wsock32
gethostbyname
inet_addr
Sections
.text Size: 232KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 36KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.lrdata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE