Static task
static1
Behavioral task
behavioral1
Sample
07ee65cc64fd9c694a0e946fd50b4b24_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07ee65cc64fd9c694a0e946fd50b4b24_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
07ee65cc64fd9c694a0e946fd50b4b24_JaffaCakes118
-
Size
1.3MB
-
MD5
07ee65cc64fd9c694a0e946fd50b4b24
-
SHA1
35fca1f12d399f6bc59155be16849b75ba200fb4
-
SHA256
2f1659c68db862abf153e50e602cfe5141b9f17e146cd49b21cbd16e6de91042
-
SHA512
521ceca3677306b86ee1b654c5f3d95132de6d2a5c7ac8266b3628642f8a94b5ee058edcc36ecc1123eeecd1616ce182a5f8e9f4875dbee4ce178027fd0a1e50
-
SSDEEP
24576:B3x2+RVNRjD9gmv7rRBkrUzhnKH9HdHdHdHfFfHdHdHdHfFfHdHdHdHfFfHdHdHb:BEkjD3v7yUzZGz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07ee65cc64fd9c694a0e946fd50b4b24_JaffaCakes118
Files
-
07ee65cc64fd9c694a0e946fd50b4b24_JaffaCakes118.exe windows:5 windows x86 arch:x86
a3bcc334809f18a3e5a9bb8b816efca5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenW
lstrlenA
lstrcmpiW
lstrcatW
WriteFile
WriteConsoleOutputCharacterW
WideCharToMultiByte
WaitForSingleObject
VirtualFreeEx
Sleep
SetTimerQueueTimer
SetLastError
SetFileAttributesW
SetEvent
ResumeThread
ResetEvent
ReadFile
QueryPerformanceFrequency
QueryPerformanceCounter
OutputDebugStringA
OpenFileMappingW
OpenEventW
MoveFileW
LocalFree
LocalFlags
LocalAlloc
LoadLibraryW
IsValidCodePage
InterlockedExchange
Heap32Next
Heap32ListFirst
GetWindowsDirectoryW
GetUserDefaultLCID
GetTickCount
GetTempPathW
GetTempFileNameW
GetSystemTime
GetSystemInfo
GetSystemDirectoryW
GetSystemDefaultUILanguage
GetStringTypeExA
GetStartupInfoW
GetProfileSectionA
GetPrivateProfileStringW
GetPrivateProfileSectionW
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFileTime
GetFileSize
GetFileInformationByHandle
GetFileAttributesW
GetFileAttributesExW
GetFileAttributesA
GetExitCodeThread
GetDriveTypeW
GetDateFormatW
GetCurrentProcessId
GetCurrentProcess
GetCommProperties
FreeLibrary
FormatMessageW
FindNextVolumeMountPointW
FindNextFileW
FindFirstFileW
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExpandEnvironmentStringsW
ExitProcess
EnumResourceTypesW
DuplicateHandle
DeleteFileW
GetProcAddress
DeleteFileA
DebugBreak
CreateProcessW
CreateFileA
CreateEventW
CreateDirectoryW
CopyFileW
CloseHandle
BuildCommDCBW
GetModuleHandleA
CreateFileW
LoadLibraryA
user32
InvalidateRect
InflateRect
GetWindowTextW
GetWindowTextLengthW
GetWindowTextLengthA
GetWindowRect
GetWindowModuleFileNameW
GetWindowLongW
GetWindow
GetTopWindow
GetTitleBarInfo
GetSystemMetrics
GetShellWindow
GetScrollPos
GetParent
GetDlgItemTextW
GetDlgItem
GetDlgCtrlID
GetClipboardOwner
GetClientRect
GetAltTabInfoA
GetAltTabInfo
FindWindowW
FillRect
EnumDisplaySettingsExA
EndPaint
EnableScrollBar
DrawTextW
InvertRect
DestroyWindow
DdeCmpStringHandles
CopyRect
ChildWindowFromPointEx
CheckDlgButton
CallWindowProcA
BlockInput
BeginPaint
LoadCursorFromFileW
LoadIconA
GetAsyncKeyState
GetCursor
EnumClipboardFormats
CharNextW
IsCharLowerA
GetFocus
GetKBCodePage
IsIconic
CloseWindowStation
GetForegroundWindow
VkKeyScanA
GetMessagePos
GetWindowContextHelpId
OemKeyScan
GetDC
WindowFromDC
GetKeyboardType
IsDlgButtonChecked
IsWindow
IsWindowVisible
KillTimer
LoadCursorA
LoadCursorW
LoadKeyboardLayoutW
LockWorkStation
MenuItemFromPoint
MessageBoxW
PostMessageW
RegisterWindowMessageW
SendMessageW
SendNotifyMessageW
SetActiveWindow
SetClassLongW
SetDlgItemInt
SetDlgItemTextW
SetFocus
SetForegroundWindow
SetMenuItemInfoW
SetScrollInfo
SetScrollPos
SetWindowLongW
SetWindowPos
SetWindowWord
ShowWindow
UserHandleGrantAccess
ValidateRect
VkKeyScanExA
DrawFocusRect
gdi32
FONTOBJ_pxoGetXform
GdiConvertToDevmodeW
GdiDescribePixelFormat
GdiGetCharDimensions
GetBrushOrgEx
GetCharWidth32W
GetCharWidthInfo
GetDCOrgEx
GetDIBColorTable
GetDeviceCaps
GetETM
GetFontLanguageInfo
GetRgnBox
GetTextExtentPointW
GetTextFaceAliasW
GetTextFaceW
GetTextMetricsW
LineTo
MoveToEx
NamedEscape
PolylineTo
FONTOBJ_pvTrueTypeFontFile
PtVisible
Rectangle
RemoveFontResourceTracking
ResizePalette
SelectObject
SetAbortProc
SetBkMode
SetBoundsRect
SetColorAdjustment
SetDCPenColor
SetDIBitsToDevice
SetLayout
SetMagicColors
SetTextColor
StartDocW
StartPage
StretchDIBits
TextOutW
UnloadNetworkFonts
bMakePathNameW
EngGetDriverName
EnumEnhMetaFile
EngFreeModule
EngDeleteSurface
EngDeletePalette
EndPage
EndDoc
DeleteObject
DeleteDC
CreateSolidBrush
CreateICA
CreateFontW
CombineRgn
AbortDoc
GdiFlush
GetColorSpace
FlattenPath
StrokePath
AddFontResourceW
DeleteMetaFile
GetDCBrushColor
SwapBuffers
PtInRegion
CreatePen
DeleteEnhMetaFile
comdlg32
GetOpenFileNameW
advapi32
RegSetValueExW
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegFlushKey
RegEnumKeyExW
RegCreateKeyW
RegCloseKey
OpenEventLogW
LsaQueryInformationPolicy
LsaOpenPolicy
LsaFreeMemory
LsaClose
IsValidSid
GetSidSubAuthorityCount
GetSidSubAuthority
GetSidIdentifierAuthority
CloseEventLog
BackupEventLogW
RegQueryValueExW
RegOpenKeyW
shell32
SHGetDiskFreeSpaceExW
ShellExecuteEx
ShellExecuteA
ShellAboutW
SHQueryRecycleBinW
SHIsFileAvailableOffline
CheckEscapesW
ExtractIconEx
ExtractIconExA
ExtractIconExW
FindExecutableW
SHBrowseForFolderW
SHChangeNotify
SHCreateDirectoryExW
SHEmptyRecycleBinW
SHFileOperation
SHGetDataFromIDListA
SHGetDiskFreeSpaceA
SHGetFolderLocation
SHGetIconOverlayIndexA
SHGetMalloc
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetSpecialFolderPathW
Shell_NotifyIcon
ole32
CoInitialize
CoInitializeSecurity
CoTaskMemFree
CoUninitialize
CoCreateInstance
shlwapi
StrRStrIA
StrCmpNW
StrCmpNA
StrRStrIW
StrChrA
msvcrt
_waccess
wcsstr
wcsrchr
wcsncpy
wcsncmp
wcsncat
_CxxThrowException
_EH_prolog
_XcptFilter
__CxxFrameHandler
__dllonexit
__p__commode
__p__fmode
__set_app_type
__setusermatherr
__wgetmainargs
_adjust_fdiv
_beginthread
_chdrive
_close
_controlfp
_errno
_except_handler3
_exit
_findclose
_ftol
_getdrive
_initterm
_itow
_lseek
_ltow
_makepath
_memccpy
_onexit
_open
_pctype
_read
_sleep
_splitpath
_tempnam
_wchdir
_wcmdln
_wcsdup
_wcsicmp
_wcsnicmp
_wcsrev
_wcsupr
_wfindfirst
_wfindnext
_wgetenv
_wmakepath
_wopen
_write
_wsplitpath
_wtoi
_wtoi64
calloc
exit
free
isdigit
isspace
malloc
realloc
remove
sprintf
swprintf
toupper
vswprintf
wcscat
wcschr
wcscmp
wcscpy
wcslen
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 152KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 556KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ