Static task
static1
Behavioral task
behavioral1
Sample
693a2c0dfc2c71ee4591dc8d36db2cce_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
693a2c0dfc2c71ee4591dc8d36db2cce_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
693a2c0dfc2c71ee4591dc8d36db2cce_JaffaCakes118
-
Size
1.1MB
-
MD5
693a2c0dfc2c71ee4591dc8d36db2cce
-
SHA1
d73e9eca054e5a03153dec7a6fddf9e893bce1f0
-
SHA256
170e703d5323f933ed08783d65ae32911370b9bc0239adbc5790a01b0dbb9736
-
SHA512
f1d02ff2b6f21c2033fd7c18c2c009f1f2c65cd49c50927a469a32d217d13f74095d71ba0566042d8cdbcc1e01d6aaac62052bed627dfea44e285e01ebdf8ad2
-
SSDEEP
12288:/sM+aTA3c+FK1vrlVYBVignBtZnfVq4cz1i5pP9kPQ6q:EV4W8hqBYgnBLfVqx1WjkHq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 693a2c0dfc2c71ee4591dc8d36db2cce_JaffaCakes118
Files
-
693a2c0dfc2c71ee4591dc8d36db2cce_JaffaCakes118.exe windows:5 windows x86 arch:x86
a5260ce0dbc6c02711ad81ba435690cb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
oleacc
AccessibleObjectFromWindow
kernel32
InterlockedIncrement
lstrcmpiW
LoadLibraryExW
TlsGetValue
LeaveCriticalSection
InterlockedDecrement
EnterCriticalSection
WideCharToMultiByte
GetCurrentProcessId
CreateThread
MultiByteToWideChar
SetFileAttributesW
GetFileAttributesW
GetProcessId
GetModuleFileNameW
CreateDirectoryW
MulDiv
GetModuleHandleW
FindResourceW
ReadConsoleW
SetEndOfFile
WriteConsoleW
SetFilePointerEx
FlushFileBuffers
SetStdHandle
FreeLibrary
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetConsoleMode
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
LoadResource
FindResourceExW
LockResource
Sleep
SizeofResource
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionAndSpinCount
HeapFree
GetProcAddress
IsValidLocale
GetFileType
GetACP
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
VirtualQuery
VirtualProtect
GetSystemInfo
RtlUnwind
QueryPerformanceCounter
GetStartupInfoW
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
SetEvent
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
GetSystemTimeAsFileTime
TlsFree
ReadFile
SetFilePointer
CreateFileW
CloseHandle
GetFileSize
SetLastError
GetCurrentThreadId
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcmpW
GetCurrentProcess
GetEnvironmentVariableW
TlsAlloc
FormatMessageW
LocalFree
IsDebuggerPresent
OutputDebugStringW
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
LoadLibraryExA
GetStringTypeW
CreateEventW
TlsSetValue
user32
ReleaseDC
UpdateWindow
BeginPaint
UnregisterClassW
EndPaint
GetDesktopWindow
CallWindowProcW
PostMessageW
CharNextW
MessageBoxW
ShowWindow
InvalidateRect
GetWindowLongW
GetWindowThreadProcessId
GetMessageW
DefWindowProcW
GetWindowRect
DestroyWindow
GetDC
IsWindowVisible
SetWindowPos
EqualRect
EnumChildWindows
CreateWindowExW
GetSystemMetrics
RegisterClassExW
IsWindow
DispatchMessageW
SetTimer
PeekMessageW
MoveWindow
GetWindowTextW
GetCursorPos
SetForegroundWindow
ReleaseCapture
RegisterWindowMessageW
GetParent
GetClassInfoExW
GetDlgItem
GetClientRect
SetCapture
SetFocus
CreateAcceleratorTableW
GetSysColor
IsChild
DestroyAcceleratorTable
ClientToScreen
RedrawWindow
InvalidateRgn
SetWindowTextW
SendMessageW
ScreenToClient
FillRect
GetFocus
GetWindow
GetWindowTextLengthW
EnumWindows
LoadBitmapW
SetLayeredWindowAttributes
TranslateMessage
LoadCursorW
GetClassNameW
SetWindowLongW
DrawTextW
KillTimer
gdi32
GetObjectW
DeleteDC
GetStockObject
CreateCompatibleBitmap
CreateSolidBrush
CreateFontIndirectW
SetBkMode
SetTextColor
GetDIBits
CreateCompatibleDC
SelectObject
BitBlt
DeleteObject
GetDeviceCaps
advapi32
CryptCreateHash
CryptAcquireContextW
RegQueryInfoKeyW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegSetValueExW
CryptHashData
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
RegEnumKeyW
RegQueryValueExW
shell32
SHGetFolderPathW
ShellExecuteW
ShellExecuteExW
ole32
OleLockRunning
CoGetClassObject
OleUninitialize
StringFromGUID2
CoTaskMemRealloc
CreateStreamOnHGlobal
OleInitialize
CLSIDFromString
CLSIDFromProgID
CoCreateGuid
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CoUninitialize
CoInitialize
oleaut32
LoadTypeLi
OleCreateFontIndirect
VarBstrCat
SysStringLen
SysAllocStringLen
LoadRegTypeLi
VariantClear
VarBstrCmp
SysAllocString
SysFreeString
VariantInit
VarUI4FromStr
shlwapi
UrlEscapeW
PathAppendW
PathAddBackslashW
UrlUnescapeW
wininet
InternetCloseHandle
HttpSendRequestW
InternetCrackUrlW
InternetOpenW
HttpOpenRequestW
InternetConnectW
Sections
.text Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 732KB - Virtual size: 731KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ