Static task
static1
Behavioral task
behavioral1
Sample
459401d3691d4a4d711b23932b5d9e37_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
459401d3691d4a4d711b23932b5d9e37_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
459401d3691d4a4d711b23932b5d9e37_JaffaCakes118
-
Size
625KB
-
MD5
459401d3691d4a4d711b23932b5d9e37
-
SHA1
f28142f3259339111a90ba565808e9988334c393
-
SHA256
1f025143a04b2bc0a55a4926a7d6dcd4a46b77ab5a5ca540776d6368f409ae1b
-
SHA512
01272ccdb88d701694580676dbddf92d7d4d453723e007eca1e5ce3655a46149846cb1ae0814678aa9d123bf21a708d280772a2a7499d31777942666576c6e95
-
SSDEEP
12288:VQjEx5GbdKTWjgkBvk9z5ccGS9ZfZ/I8FKP49ma4CW:VQjEWdJW8LSZIqvQanW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 459401d3691d4a4d711b23932b5d9e37_JaffaCakes118
Files
-
459401d3691d4a4d711b23932b5d9e37_JaffaCakes118.exe windows:5 windows x86 arch:x86
c1dee3c20cd59cfee87bf5572caba74b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SendMessageA
DefWindowProcA
DispatchMessageA
EnableWindow
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
InvalidateRect
GetWindowRect
GetClipboardData
InsertMenuA
LoadMenuA
GetWindowThreadProcessId
LoadImageW
RegisterClipboardFormatA
ShowCursor
IsZoomed
RegisterShellHookWindow
MapVirtualKeyExA
IsIconic
EndMenu
GetMenuDefaultItem
DrawFocusRect
InSendMessageEx
GetWindowDC
GetDialogBaseUnits
EnableMenuItem
TrackMouseEvent
DrawCaption
IsCharAlphaNumericW
MapVirtualKeyExW
ValidateRect
ExitWindowsEx
CharNextA
DialogBoxParamA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
EndDialog
ScreenToClient
PeekMessageA
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
LoadCursorA
SetCursor
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
CreateDialogParamA
DestroyWindow
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
comdlg32
GetOpenFileNameW
shell32
SHFileOperationA
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
SHGetSpecialFolderLocation
ole32
OleTranslateAccelerator
OleInitialize
OleUninitialize
CreateOleAdviseHolder
OleDuplicateData
CoCreateInstance
advapi32
RegOpenKeyExA
RegEnumKeyA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegEnumValueA
gdi32
GetGlyphOutlineW
ExtTextOutW
SetRectRgn
GetGlyphOutlineA
SetMapperFlags
GetObjectW
GetTextColor
GetNearestColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SetBkColor
SelectObject
CombineTransform
DeleteEnhMetaFile
GetCharWidthA
TranslateCharsetInfo
GetArcDirection
GetKerningPairsW
OffsetWindowOrgEx
SaveDC
CreateCompatibleDC
GetMetaRgn
GetObjectType
EnumMetaFile
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
GetEnvironmentStrings
FreeEnvironmentStringsA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStdHandle
GetModuleHandleW
HeapCreate
VirtualAlloc
VirtualFree
HeapFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetStartupInfoA
HeapAlloc
lstrcatW
TlsFree
GetExitCodeThread
GetEnvironmentVariableW
VirtualProtectEx
LockResource
SearchPathW
GetUserDefaultLCID
CreateDirectoryW
ResetEvent
FreeEnvironmentStringsW
HeapReAlloc
IsDBCSLeadByteEx
ContinueDebugEvent
lstrcpynW
IsDebuggerPresent
TlsSetValue
GetModuleFileNameW
PeekNamedPipe
FindNextChangeNotification
LockFileEx
GlobalCompact
GetCommTimeouts
ExpandEnvironmentStringsA
GetEnvironmentVariableA
WideCharToMultiByte
GetLastError
lstrcmpiA
CloseHandle
SetFileTime
GetFileAttributesA
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
lstrcatA
SetCurrentDirectoryA
CreateDirectoryA
SetFileAttributesA
Sleep
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
RtlUnwind
RaiseException
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
VirtualProtect
GetCommandLineA
GetFileSize
GetModuleFileNameA
GetTickCount
GetCurrentProcess
WriteFile
GetPrivateProfileStringA
WritePrivateProfileStringA
MultiByteToWideChar
FreeLibrary
GetProcAddress
LoadLibraryA
GetModuleHandleA
ReadFile
SetErrorMode
GetExitCodeProcess
WaitForSingleObject
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
MulDiv
GetSystemDirectoryA
lstrlenA
lstrcpyA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
GetTempFileNameA
CreateFileA
RemoveDirectoryA
CreateProcessA
CreateThread
GlobalAlloc
GlobalLock
GlobalUnlock
GetDiskFreeSpaceA
GetUserDefaultLangID
GetTempPathA
GetWindowsDirectoryA
GlobalFree
lstrcpynA
ExitProcess
CopyFileA
Sections
.text Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 223KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.undermy Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 463KB - Virtual size: 462KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ