Static task
static1
Behavioral task
behavioral1
Sample
22dcaf02cbcbd323e539243154535e00_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
22dcaf02cbcbd323e539243154535e00_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
22dcaf02cbcbd323e539243154535e00_JaffaCakes118
-
Size
739KB
-
MD5
22dcaf02cbcbd323e539243154535e00
-
SHA1
376bd1253847685f272492913e05cc2535c934ea
-
SHA256
97935e38f6c031bb231fec2cf6ed41e4385d05933982c25b33eca7bc36f799f7
-
SHA512
d41d340f7ee8ba086643b354ce20d162cd9e11aff92f6bfeba9bfa7847e2fa89767308ef8d6e649985bf753c617a7c97d4b46ba2cbe07d8c4658102543391b81
-
SSDEEP
12288:tyfDnjmn/fv/yP+5jdFj47qmZMLru3TtbyI7s9Z7F1S50QaZRh+/S00gfxz:MmfyP+5X8OsMGjdnm7PSqXAS0nz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 22dcaf02cbcbd323e539243154535e00_JaffaCakes118
Files
-
22dcaf02cbcbd323e539243154535e00_JaffaCakes118.exe windows:5 windows x86 arch:x86
bd25824fe3a4b5a4d71d82c0683dd30d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
GetOEMCP
GetModuleHandleW
SetErrorMode
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetConsoleCP
GetConsoleMode
HeapAlloc
HeapFree
GetTimeFormatA
GetDateFormatA
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
ExitProcess
HeapSize
SetStdHandle
GetFileType
GetACP
IsValidCodePage
SetHandleCount
GetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
InterlockedIncrement
GetConsoleOutputCP
WriteConsoleW
VirtualFree
HeapCreate
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
GlobalFlags
TlsFree
LocalReAlloc
CreateDirectoryA
WaitForMultipleObjects
CreateProcessA
FindFirstFileW
InterlockedCompareExchange
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GetFileTime
GetFileSizeEx
GetFileAttributesA
SetFileAttributesA
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileAttributesExA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetThreadLocale
GetStringTypeExA
MoveFileA
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
InterlockedDecrement
GetModuleFileNameW
GlobalFree
GlobalAlloc
LocalFree
GetCurrentProcessId
GetModuleFileNameA
GlobalLock
GlobalUnlock
MulDiv
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
MultiByteToWideChar
lstrcmpW
GetModuleHandleA
GetProcAddress
GetVersionExA
FormatMessageA
SetLastError
GetCurrentThread
TerminateThread
CreateThread
WaitForSingleObject
GetLocalTime
SetEvent
GetFileInformationByHandle
ReadFile
CloseHandle
WriteFile
CreateFileA
CreateEventA
GetFileSize
SetFilePointer
WritePrivateProfileStringA
GetPrivateProfileStringA
WinExec
lstrlenA
lstrcatA
lstrcpyA
FreeLibrary
LoadLibraryA
GetWindowsDirectoryA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
InitializeCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EnterCriticalSection
Sleep
GetLastError
CreateMutexA
DeleteFileA
WriteConsoleA
GetTickCount
user32
GetNextDlgGroupItem
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
ReleaseCapture
SetCapture
UnregisterClassA
GetSysColorBrush
DestroyMenu
CharUpperA
WindowFromPoint
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
RegisterClipboardFormatA
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
PostThreadMessageA
CheckMenuItem
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
EnableWindow
GetSysColor
RedrawWindow
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
MapWindowPoints
GetKeyState
SetMenu
EnableMenuItem
LoadStringA
SendMessageA
LoadIconA
GetParent
MessageBoxA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
InvalidateRect
PostMessageA
KillTimer
SetWindowLongA
MessageBeep
SetTimer
GetMessagePos
ScreenToClient
PtInRect
SetCursor
IsWindow
GetWindowRect
GetDC
ReleaseDC
InflateRect
LoadCursorA
SetForegroundWindow
UpdateWindow
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
GetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
PeekMessageA
IsWindowVisible
CopyIcon
gdi32
GetDeviceCaps
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
CreateSolidBrush
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetTextExtentPoint32A
CreateFontIndirectA
GetObjectA
GetStockObject
SetViewportExtEx
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegSetValueExA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
GetUserNameA
RegCloseKey
RegQueryValueA
shell32
ShellExecuteA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
oledlg
ord8
ole32
OleIsCurrentClipboard
CoRegisterMessageFilter
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
CoGetClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
CoInitialize
CoRevokeClassObject
OleFlushClipboard
StgOpenStorageOnILockBytes
oleaut32
SysAllocStringLen
SysStringLen
SysFreeString
SysAllocStringByteLen
VariantCopy
VariantInit
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
VariantChangeType
VariantClear
wsock32
WSASetLastError
shutdown
accept
__WSAFDIsSet
getsockopt
connect
inet_ntoa
setsockopt
ioctlsocket
WSAStartup
recv
ntohl
WSAGetLastError
send
select
recvfrom
sendto
closesocket
gethostbyname
socket
WSACleanup
htons
wininet
InternetSetCookieA
InternetAttemptConnect
InternetConnectA
HttpSendRequestExA
HttpEndRequestA
InternetSetStatusCallback
InternetOpenA
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetWriteFile
InternetReadFile
FtpOpenFileA
InternetQueryOptionA
InternetCloseHandle
HttpQueryInfoA
InternetSetFilePointer
FtpGetFileSize
netapi32
Netbios
Sections
.text Size: 586KB - Virtual size: 585KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ