Static task
static1
Behavioral task
behavioral1
Sample
6a161e3c02c78494d5fdd9429bcb0602_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6a161e3c02c78494d5fdd9429bcb0602_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
6a161e3c02c78494d5fdd9429bcb0602_JaffaCakes118
-
Size
1.1MB
-
MD5
6a161e3c02c78494d5fdd9429bcb0602
-
SHA1
e79de38832c3486635a1e1e079e120ac392df2d0
-
SHA256
caeb5be825089c6aa7ab75c709a1656689d636ac75fd46375860d7eefc8fe26f
-
SHA512
bdf6376afa22463d3d973a8ccd3e89fc98160f9260a9d75cb12b42201c95846c7ad80fe0ea35a3dd057539710dadebdcc7e22d3508de6149017cd7c990fd8d8a
-
SSDEEP
12288:HsM+aTA3c+FK1vrlVYBVignBtZnfVq4cz1i5pP9kPQyh:MV4W8hqBYgnBLfVqx1Wjkfh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 6a161e3c02c78494d5fdd9429bcb0602_JaffaCakes118
Files
-
6a161e3c02c78494d5fdd9429bcb0602_JaffaCakes118.exe windows:5 windows x86 arch:x86
a5260ce0dbc6c02711ad81ba435690cb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
oleacc
AccessibleObjectFromWindow
kernel32
InterlockedIncrement
lstrcmpiW
LoadLibraryExW
TlsGetValue
LeaveCriticalSection
InterlockedDecrement
EnterCriticalSection
WideCharToMultiByte
GetCurrentProcessId
CreateThread
MultiByteToWideChar
SetFileAttributesW
GetFileAttributesW
GetProcessId
GetModuleFileNameW
CreateDirectoryW
MulDiv
GetModuleHandleW
FindResourceW
ReadConsoleW
SetEndOfFile
WriteConsoleW
SetFilePointerEx
FlushFileBuffers
SetStdHandle
FreeLibrary
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetConsoleMode
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
LoadResource
FindResourceExW
LockResource
Sleep
SizeofResource
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionAndSpinCount
HeapFree
GetProcAddress
IsValidLocale
GetFileType
GetACP
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
VirtualQuery
VirtualProtect
GetSystemInfo
RtlUnwind
QueryPerformanceCounter
GetStartupInfoW
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
SetEvent
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
GetSystemTimeAsFileTime
TlsFree
ReadFile
SetFilePointer
CreateFileW
CloseHandle
GetFileSize
SetLastError
GetCurrentThreadId
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcmpW
GetCurrentProcess
GetEnvironmentVariableW
TlsAlloc
FormatMessageW
LocalFree
IsDebuggerPresent
OutputDebugStringW
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
LoadLibraryExA
GetStringTypeW
CreateEventW
TlsSetValue
user32
ReleaseDC
UpdateWindow
BeginPaint
UnregisterClassW
EndPaint
GetDesktopWindow
CallWindowProcW
PostMessageW
CharNextW
MessageBoxW
ShowWindow
InvalidateRect
GetWindowLongW
GetWindowThreadProcessId
GetMessageW
DefWindowProcW
GetWindowRect
DestroyWindow
GetDC
IsWindowVisible
SetWindowPos
EqualRect
EnumChildWindows
CreateWindowExW
GetSystemMetrics
RegisterClassExW
IsWindow
DispatchMessageW
SetTimer
PeekMessageW
MoveWindow
GetWindowTextW
GetCursorPos
SetForegroundWindow
ReleaseCapture
RegisterWindowMessageW
GetParent
GetClassInfoExW
GetDlgItem
GetClientRect
SetCapture
SetFocus
CreateAcceleratorTableW
GetSysColor
IsChild
DestroyAcceleratorTable
ClientToScreen
RedrawWindow
InvalidateRgn
SetWindowTextW
SendMessageW
ScreenToClient
FillRect
GetFocus
GetWindow
GetWindowTextLengthW
EnumWindows
LoadBitmapW
SetLayeredWindowAttributes
TranslateMessage
LoadCursorW
GetClassNameW
SetWindowLongW
DrawTextW
KillTimer
gdi32
GetObjectW
DeleteDC
GetStockObject
CreateCompatibleBitmap
CreateSolidBrush
CreateFontIndirectW
SetBkMode
SetTextColor
GetDIBits
CreateCompatibleDC
SelectObject
BitBlt
DeleteObject
GetDeviceCaps
advapi32
CryptCreateHash
CryptAcquireContextW
RegQueryInfoKeyW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegSetValueExW
CryptHashData
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
RegEnumKeyW
RegQueryValueExW
shell32
SHGetFolderPathW
ShellExecuteW
ShellExecuteExW
ole32
OleLockRunning
CoGetClassObject
OleUninitialize
StringFromGUID2
CoTaskMemRealloc
CreateStreamOnHGlobal
OleInitialize
CLSIDFromString
CLSIDFromProgID
CoCreateGuid
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CoUninitialize
CoInitialize
oleaut32
LoadTypeLi
OleCreateFontIndirect
VarBstrCat
SysStringLen
SysAllocStringLen
LoadRegTypeLi
VariantClear
VarBstrCmp
SysAllocString
SysFreeString
VariantInit
VarUI4FromStr
shlwapi
UrlEscapeW
PathAppendW
PathAddBackslashW
UrlUnescapeW
wininet
InternetCloseHandle
HttpSendRequestW
InternetCrackUrlW
InternetOpenW
HttpOpenRequestW
InternetConnectW
Sections
.text Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 732KB - Virtual size: 731KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ