Static task
static1
Behavioral task
behavioral1
Sample
fb78bd0705f44be6de76286df7d606ea_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb78bd0705f44be6de76286df7d606ea_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fb78bd0705f44be6de76286df7d606ea_JaffaCakes118
-
Size
862KB
-
MD5
fb78bd0705f44be6de76286df7d606ea
-
SHA1
4a21f66dc2ba1625064bf62e4408bfa1065b3ea1
-
SHA256
e54c0f5d6f5d2793e994dd20a4f41aee05f5772094cad74670de84b8ba0112ec
-
SHA512
7879c62c827c2b8e1bf884eacf83ca62d477c736663d5d4d80dcf197f965c694ab9cb08c8bd1edc5df8e4c736a2d0f35e9f73dde61682815326d7476ae790b7e
-
SSDEEP
24576:tRC25Lc1PrR/UD3umTKCytWmxSJxBiM1/l15:tRCgLcYTuhCpTBiM1b5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource fb78bd0705f44be6de76286df7d606ea_JaffaCakes118
Files
-
fb78bd0705f44be6de76286df7d606ea_JaffaCakes118.exe windows:5 windows x86 arch:x86
1836fff31080c2e10f2b64549cb0ab94
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStdHandle
GetModuleFileNameA
GetCurrentThreadId
DuplicateHandle
TlsFree
LocalFileTimeToFileTime
SetEvent
GlobalFree
SetEnvironmentVariableA
GetVersionExW
GetStringTypeW
GetDriveTypeW
SetLastError
FreeLibrary
GetACP
SetErrorMode
ExitThread
ReadFile
CloseHandle
FreeEnvironmentStringsW
GetOEMCP
Process32FirstW
HeapSize
FindClose
CreateProcessW
GlobalAlloc
DeleteCriticalSection
GetCPInfo
CreateFileW
TerminateThread
GetModuleHandleW
FileTimeToLocalFileTime
GetTempPathW
CreateEventW
GetEnvironmentVariableW
GetModuleFileNameW
WriteProcessMemory
WideCharToMultiByte
LCMapStringW
GetProcessHeap
WriteConsoleW
LoadLibraryW
OutputDebugStringW
SetSystemPowerState
InitializeCriticalSectionAndSpinCount
GetLocalTime
GetEnvironmentStringsW
SetPriorityClass
LoadLibraryA
GetWindowsDirectoryW
GetConsoleCP
GetTimeFormatA
EnumResourceNamesW
VirtualAlloc
SizeofResource
SetFilePointerEx
QueryPerformanceCounter
SystemTimeToFileTime
Beep
GlobalLock
InterlockedExchange
UnhandledExceptionFilter
GetStringTypeA
GetStartupInfoA
TlsSetValue
GetSystemDirectoryW
CopyFileW
MoveFileW
GetExitCodeProcess
VirtualFree
HeapReAlloc
SetUnhandledExceptionFilter
FindResourceW
VirtualProtect
GetTimeZoneInformation
Sleep
GetPrivateProfileSectionW
InterlockedIncrement
CompareStringA
GetSystemTimeAsFileTime
CreateDirectoryW
EnterCriticalSection
RtlUnwind
VirtualFreeEx
SetEnvironmentVariableW
DeviceIoControl
CreateFileA
GetModuleHandleA
SetVolumeLabelW
GetLocaleInfoA
CreateHardLinkW
GetProcessIoCounters
ResumeThread
GetComputerNameW
RemoveDirectoryW
GetCurrentDirectoryW
IsValidCodePage
GetFileType
SetFileTime
MultiByteToWideChar
SetFilePointer
WritePrivateProfileSectionW
GlobalMemoryStatusEx
LCMapStringA
GetFileAttributesW
GetCurrentThread
GetPrivateProfileSectionNamesW
GetDiskFreeSpaceW
Process32NextW
GetCommandLineW
GetFileSize
MulDiv
IsDebuggerPresent
SetFileAttributesW
TlsAlloc
CompareStringW
ExitProcess
FindNextFileW
InterlockedDecrement
GetDateFormatA
GetStartupInfoW
CreatePipe
HeapAlloc
GetTempFileNameW
RaiseException
WritePrivateProfileStringW
HeapFree
SetHandleCount
OpenProcess
QueryPerformanceFrequency
GetCurrentProcess
GetSystemInfo
GetConsoleMode
CreateThread
CreateToolhelp32Snapshot
LoadResource
LoadLibraryExW
WriteFile
TerminateProcess
FileTimeToSystemTime
WaitForSingleObject
GetConsoleOutputCP
WriteConsoleA
FormatMessageW
ReadProcessMemory
GetPrivateProfileStringW
TlsGetValue
GlobalUnlock
SetStdHandle
LockResource
GetCurrentProcessId
LeaveCriticalSection
GetDiskFreeSpaceExW
GetTickCount
FindFirstFileW
GetProcAddress
lstrcmpiW
FlushFileBuffers
VirtualAllocEx
DeleteFileW
GetLastError
SetEndOfFile
SetCurrentDirectoryW
GetShortPathNameW
GetFullPathNameW
user32
IsWindowVisible
InflateRect
PostQuitMessage
MapVirtualKeyW
MessageBoxW
ScreenToClient
GetMonitorInfoW
OpenWindowStationW
SetCapture
DefWindowProcW
IsDialogMessageW
CreateAcceleratorTableW
wsprintfW
GetFocus
SendDlgItemMessageW
OpenDesktopW
GetMenu
DeleteMenu
LoadStringW
CharUpperBuffW
DestroyIcon
IsZoomed
SetWindowLongW
PostMessageW
ExitWindowsEx
SetForegroundWindow
ClientToScreen
GetCursorPos
IsWindowEnabled
GetKeyboardState
CreatePopupMenu
SetUserObjectSecurity
GetSystemMetrics
GetAsyncKeyState
LoadImageW
TranslateMessage
SetProcessWindowStation
CheckMenuRadioItem
AttachThreadInput
EmptyClipboard
SetMenuItemInfoW
ReleaseCapture
CharLowerBuffW
GetMenuItemInfoW
RegisterWindowMessageW
CloseWindowStation
GetSubMenu
GetCursorInfo
GetWindowTextW
IsCharAlphaNumericW
DispatchMessageW
GetMenuStringW
GetDlgCtrlID
EndPaint
SetMenu
CopyRect
MessageBoxA
SetRect
GetClassLongW
DrawMenuBar
EnumThreadWindows
OpenClipboard
TranslateAcceleratorW
SetFocus
BeginPaint
DrawTextW
ShowWindow
GetForegroundWindow
GetClassNameW
CharNextW
GetMenuItemCount
RegisterHotKey
IsWindow
CloseDesktop
DrawFocusRect
GetActiveWindow
GetUserObjectSecurity
WindowFromPoint
UnregisterHotKey
FrameRect
BlockInput
DialogBoxParamW
SetKeyboardState
IsIconic
SendMessageTimeoutW
GetDesktopWindow
DestroyAcceleratorTable
DestroyMenu
GetDC
GetMenuItemID
FlashWindow
GetClientRect
GetProcessWindowStation
DestroyWindow
VkKeyScanW
CreateIconFromResourceEx
RegisterClassExW
GetWindowRect
mouse_event
GetDlgItem
LockWindowUpdate
GetSysColorBrush
IsMenu
AdjustWindowRectEx
GetKeyState
RedrawWindow
GetClipboardData
SendMessageW
CreateMenu
SetActiveWindow
IsCharUpperW
SetMenuDefaultItem
SendInput
CloseClipboard
EnumWindows
EndDialog
ReleaseDC
FillRect
IsClipboardFormatAvailable
MonitorFromPoint
SystemParametersInfoW
GetMessageW
IsDlgButtonChecked
GetWindowTextLengthW
LoadIconW
FindWindowExW
SetWindowPos
MessageBeep
GetWindowDC
keybd_event
GetKeyboardLayoutNameW
PeekMessageW
LoadCursorW
SetCursor
CountClipboardFormats
FindWindowW
SetWindowTextW
CopyImage
SetClipboardData
MonitorFromRect
SetLayeredWindowAttributes
TrackPopupMenuEx
KillTimer
IsCharAlphaW
MoveWindow
EnumChildWindows
GetCaretPos
InsertMenuItemW
CreateWindowExW
EnableWindow
IsCharLowerW
PtInRect
InvalidateRect
GetWindowThreadProcessId
GetParent
DrawFrameControl
GetWindowLongW
SetTimer
DefDlgProcW
GetSysColor
gdi32
SetBkColor
GetTextFaceW
StrokeAndFillPath
StretchBlt
GetTextExtentPoint32W
EndPath
Rectangle
CreatePen
GetDIBits
ExtCreatePen
DeleteDC
BeginPath
SetViewportOrgEx
StrokePath
SetTextColor
SetPixel
PolyDraw
GetObjectW
CreateFontW
CreateCompatibleDC
RoundRect
DeleteObject
Ellipse
MoveToEx
GetPixel
CreateCompatibleBitmap
CreateSolidBrush
GetDeviceCaps
SetBkMode
AngleArc
SelectObject
CreateDCW
CloseFigure
GetStockObject
LineTo
comdlg32
GetOpenFileNameW
GetSaveFileNameW
advapi32
OpenProcessToken
OpenSCManagerW
GetTokenInformation
InitiateSystemShutdownExW
UnlockServiceDatabase
RegQueryValueExW
GetSecurityDescriptorDacl
CreateProcessAsUserW
CreateProcessWithLogonW
RegOpenKeyExW
InitializeAcl
AddAce
RegEnumKeyExW
RegDeleteKeyW
LogonUserW
CloseServiceHandle
RegEnumValueW
RegConnectRegistryW
RegSetValueExW
RegCloseKey
SetSecurityDescriptorDacl
DuplicateTokenEx
GetLengthSid
GetUserNameW
OpenThreadToken
InitializeSecurityDescriptor
RegCreateKeyExW
RegDeleteValueW
AdjustTokenPrivileges
CopySid
LockServiceDatabase
GetAclInformation
GetAce
LookupPrivilegeValueW
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ord193
SHIsFileAvailableOffline
ShellExecuteW
SHGetFolderPathW
DragQueryPoint
ShellExecuteExW
Shell_NotifyIconW
DragQueryFileW
SHEmptyRecycleBinW
SHFileOperationW
SHGetDesktopFolder
DragFinish
SHBrowseForFolderW
ExtractIconExW
SHGetMalloc
ole32
CoCreateInstance
StringFromCLSID
OleSetMenuDescriptor
OleUninitialize
CoSetProxyBlanket
CoInitializeSecurity
CLSIDFromString
CoTaskMemFree
CLSIDFromProgID
CoInitialize
OleInitialize
CreateBindCtx
MkParseDisplayName
CoCreateInstanceEx
CoTaskMemAlloc
StringFromIID
CreateStreamOnHGlobal
CoUninitialize
IIDFromString
OleSetContainedObject
oleaut32
OleLoadPicture
SafeArrayAllocDescriptorEx
VariantCopy
VariantInit
SafeArrayUnaccessData
VariantClear
GetActiveObject
LoadRegTypeLi
OACreateTypeLib2
SafeArrayAllocData
VarR8FromDec
SafeArrayGetVartype
SafeArrayAccessData
VariantTimeToSystemTime
SafeArrayDestroyDescriptor
SysAllocString
comctl32
ImageList_BeginDrag
ImageList_DragLeave
InitCommonControlsEx
ImageList_Destroy
ImageList_SetDragCursorImage
ImageList_ReplaceIcon
ImageList_EndDrag
ImageList_DragEnter
ImageList_Create
ImageList_Remove
ImageList_DragMove
winmm
timeGetTime
waveOutSetVolume
mciSendStringW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
wininet
HttpQueryInfoW
InternetReadFile
InternetCloseHandle
InternetQueryDataAvailable
InternetOpenW
InternetCrackUrlW
FtpOpenFileW
InternetSetOptionW
HttpSendRequestW
InternetQueryOptionW
InternetConnectW
HttpOpenRequestW
FtpGetFileSize
InternetOpenUrlW
wsock32
WSACleanup
socket
inet_addr
bind
setsockopt
ioctlsocket
recv
gethostname
sendto
htons
connect
WSAGetLastError
accept
ntohs
WSAStartup
recvfrom
select
__WSAFDIsSet
gethostbyname
send
listen
closesocket
mpr
WNetGetConnectionW
WNetAddConnection2W
WNetUseConnectionW
WNetCancelConnection2W
psapi
EnumProcessModules
GetModuleBaseNameW
GetProcessMemoryInfo
EnumProcesses
userenv
LoadUserProfileW
CreateEnvironmentBlock
UnloadUserProfile
DestroyEnvironmentBlock
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ryuw Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kyup Size: 320KB - Virtual size: 319KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kyupl Size: 512B - Virtual size: 473B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kuyul Size: 484KB - Virtual size: 483KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 640B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ