Static task
static1
Behavioral task
behavioral1
Sample
f0257ab14aa9d318149af534cf7ffe9d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f0257ab14aa9d318149af534cf7ffe9d_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f0257ab14aa9d318149af534cf7ffe9d_JaffaCakes118
-
Size
1.1MB
-
MD5
f0257ab14aa9d318149af534cf7ffe9d
-
SHA1
e097f443f0af03a0991c5e9db6858db7616d27c2
-
SHA256
ee4641949eaff2fc50e435d06f15d0e04d6a27d8dfdeed256b61c2a3f5d58258
-
SHA512
9b1604b716d0df0e50f6cd3f66553b36cd4e9d1c1216b24c0162ed11d79a1b19ae8322a7ec302ca68315a1ee44f1289bdc6c30336d634a4506e34b24eaafc83f
-
SSDEEP
24576:DadD2OD81/q8u/egy4GZLdJgvcfU5t7ifagBmXYEFaivGLI2DFhoQe9LnmM+pTb:DadDzggvcfU5MSIyYEfMho96M+I7Lm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f0257ab14aa9d318149af534cf7ffe9d_JaffaCakes118
Files
-
f0257ab14aa9d318149af534cf7ffe9d_JaffaCakes118.exe windows:4 windows x86 arch:x86
7fb0d290f91f481af995e51cdfb29668
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord411
ImageList_DrawEx
ImageList_GetImageInfo
ord413
ord412
_TrackMouseEvent
InitCommonControlsEx
ord410
ws2_32
listen
shutdown
WSAStartup
setsockopt
WSAAsyncSelect
connect
ntohs
getsockname
accept
inet_addr
gethostbyname
htons
getpeername
WSAGetLastError
WSACleanup
bind
closesocket
send
recv
socket
shlwapi
PathIsRootW
SHDeleteKeyW
PathRemoveFileSpecW
SHDeleteValueW
imm32
ImmGetVirtualKey
kernel32
GetFileInformationByHandle
CreateThread
WriteFile
SetConsoleTextAttribute
GetStdHandle
FreeConsole
SetConsoleScreenBufferSize
AllocConsole
SetStdHandle
DeleteCriticalSection
QueryPerformanceFrequency
QueryPerformanceCounter
FlushFileBuffers
FileTimeToSystemTime
GetSystemTime
FreeResource
LockResource
LoadResource
SizeofResource
SetFilePointer
GetSystemDefaultLangID
LoadLibraryA
SetLastError
Sleep
OpenProcess
MoveFileExW
GlobalUnlock
GlobalLock
SetErrorMode
GetFileSize
GlobalAlloc
SetThreadPriority
FreeLibrary
LocalFileTimeToFileTime
FindClose
FileTimeToLocalFileTime
GlobalFree
GetSystemInfo
GetVersionExA
MulDiv
InterlockedIncrement
InterlockedDecrement
CompareStringA
GetModuleHandleA
GetModuleFileNameA
GetWindowsDirectoryA
GetSystemDirectoryA
InterlockedExchange
GetSystemTimeAsFileTime
GetLocalTime
ResetEvent
DeviceIoControl
WaitForMultipleObjects
GetOverlappedResult
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
SetEvent
GetTickCount
ExitProcess
HeapReAlloc
HeapFree
GetProcessHeap
HeapAlloc
GetCommandLineW
GetCurrentThreadId
ReadFile
GetLastError
CloseHandle
SystemTimeToFileTime
InitializeCriticalSection
RtlUnwind
VirtualQuery
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetFileType
IsDebuggerPresent
user32
InvalidateRect
CheckDlgButton
EnumChildWindows
BringWindowToTop
CreatePopupMenu
GetMenuItemCount
GetDesktopWindow
SetTimer
UnregisterHotKey
RegisterHotKey
KillTimer
DestroyMenu
TrackPopupMenu
SetMenuDefaultItem
CreateMenu
GetCursorPos
RegisterWindowMessageA
GetClientRect
GetMessagePos
RedrawWindow
SetFocus
SetMenu
UpdateWindow
ReleaseCapture
GetCapture
GetAsyncKeyState
SetCapture
EqualRect
EndPaint
DrawEdge
DrawFrameControl
BeginPaint
GetSubMenu
GetMenu
SetClipboardViewer
ChangeClipboardChain
GetScrollInfo
GetForegroundWindow
IsDlgButtonChecked
GetMenuState
RemoveMenu
GetMenuItemID
ClientToScreen
EnableMenuItem
ScrollWindowEx
SetScrollInfo
OffsetRect
InvalidateRgn
MessageBeep
GetDoubleClickTime
SetCursorPos
GetDlgItemInt
SetDlgItemInt
GetDlgCtrlID
ValidateRect
OpenClipboard
CloseClipboard
FillRect
GetFocus
GetNextDlgTabItem
SetWindowPos
IsWindowEnabled
IsWindowVisible
DeleteMenu
AdjustWindowRect
GetDlgItem
GetWindowRect
MapWindowPoints
IntersectRect
GetDC
ReleaseDC
MessageBoxA
WaitMessage
UnhookWindowsHookEx
CallNextHookEx
PostQuitMessage
TranslateMessage
GetSystemMetrics
GetWindowThreadProcessId
DestroyWindow
SetCursor
DestroyIcon
EndDialog
GetParent
ScreenToClient
GetKeyState
ShowWindow
SetForegroundWindow
GetLastActivePopup
IsIconic
GetWindowPlacement
IsZoomed
CopyRect
PtInRect
SetClipboardData
GetMenuDefaultItem
GetSysColor
EmptyClipboard
gdi32
PatBlt
SetTextColor
SetBkColor
SetBrushOrgEx
CreatePatternBrush
SelectObject
CombineRgn
CreateBitmapIndirect
SetBkMode
RectVisible
ExcludeClipRect
GetCurrentObject
CreateRectRgn
CreateSolidBrush
GetNearestColor
DeleteDC
StretchDIBits
GetDIBits
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
SetTextAlign
GetTextAlign
GdiFlush
CreateDIBSection
SetStretchBltMode
SelectClipRgn
GetStockObject
StretchBlt
DeleteObject
advapi32
QueryServiceConfigW
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
DeleteService
ControlService
CloseServiceHandle
OpenServiceW
OpenSCManagerW
StartServiceW
CreateServiceW
DeregisterEventSource
ReportEventW
RegisterEventSourceW
RegCloseKey
RegOpenKeyA
SetServiceStatus
RegQueryValueExA
shell32
SHGetDesktopFolder
SHGetSpecialFolderLocation
ord73
DragFinish
DragQueryPoint
DragAcceptFiles
ord16
ole32
DoDragDrop
RegisterDragDrop
ReleaseStgMedium
OleDuplicateData
RevokeDragDrop
CoUninitialize
CoInitializeEx
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
Sections
.text Size: 805KB - Virtual size: 804KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bak Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bak Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bak Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bak Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bak Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bak Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bak Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bak Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bak Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bak Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bak Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bak Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bak Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bak Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bak Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bak Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bak Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE