Static task
static1
Behavioral task
behavioral1
Sample
8c7d811fbbf83e6dcb7a717a8b3cc973_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8c7d811fbbf83e6dcb7a717a8b3cc973_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
8c7d811fbbf83e6dcb7a717a8b3cc973_JaffaCakes118
-
Size
3.0MB
-
MD5
8c7d811fbbf83e6dcb7a717a8b3cc973
-
SHA1
9e03796094a40893c397cfe55067235f49984af0
-
SHA256
20880bb6f71040cecbb2d9a79c3071f5fea80c50d35cbcf9f0e5783461adc893
-
SHA512
cbc7f005613349ef0a646051d9263982ad07a74405ae1a4b008327ebf1ecd93b93a30314ed31c7e0d786f9908633305f9032f75d6aba93d894f201a037601d16
-
SSDEEP
49152:20PbK4oFm2qZqN6Ck6kTxCTcHHjNIbLRVm54TUxTcHHjNIbL:209ZqUCFM5jeBVUIje
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c7d811fbbf83e6dcb7a717a8b3cc973_JaffaCakes118
Files
-
8c7d811fbbf83e6dcb7a717a8b3cc973_JaffaCakes118.exe windows:5 windows x86 arch:x86
2a3285cbd80c49c8e06b8effb0ca21f2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoA
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
CompareStringW
GetProcessHeap
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
GetDriveTypeA
GetTimeZoneInformation
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
GetEnvironmentStringsW
GetFileAttributesA
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetStdHandle
SetHandleCount
GetFileType
SetStdHandle
GetConsoleMode
GetConsoleCP
IsValidCodePage
GetACP
ExitProcess
HeapSize
HeapReAlloc
VirtualAlloc
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
CreateThread
ExitThread
GetSystemTimeAsFileTime
CreateDirectoryA
RaiseException
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GlobalFlags
GlobalAddAtomA
CreateFileA
GetFullPathNameA
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LoadLibraryA
GetCurrentThreadId
GlobalGetAtomNameA
InterlockedIncrement
GetModuleHandleW
CompareStringA
FreeLibrary
InterlockedDecrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
lstrcmpA
GlobalFree
FormatMessageA
MultiByteToWideChar
FindFirstFileA
lstrlenA
SetLastError
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
WideCharToMultiByte
LocalFree
DeleteFileA
RemoveDirectoryA
FindResourceA
LoadResource
LockResource
SizeofResource
GlobalAlloc
GlobalLock
GlobalUnlock
FreeResource
GetModuleFileNameA
GetExitCodeThread
TerminateThread
FindFirstVolumeA
QueryDosDeviceA
FindNextVolumeA
FindVolumeClose
GetVolumePathNamesForVolumeNameA
CreateRemoteThread
Module32First
Module32Next
VirtualAllocEx
WriteProcessMemory
VirtualFreeEx
CreateProcessA
GetExitCodeProcess
WaitForSingleObject
Sleep
GetLastError
GetCurrentProcess
SetEnvironmentVariableA
lstrcmpiA
OpenProcess
TerminateProcess
CreateToolhelp32Snapshot
Process32First
CloseHandle
Process32Next
GetSystemTime
GetModuleHandleA
GetProcAddress
GetSystemInfo
GetVersionExA
GetWindowsDirectoryA
SetFileAttributesA
lstrcpyA
WritePrivateProfileSectionA
WritePrivateProfileStringA
GetPrivateProfileStringA
FreeEnvironmentStringsW
GetPrivateProfileIntA
user32
SetMenu
SetForegroundWindow
GetClientRect
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
WaitForInputIdle
wsprintfA
KillTimer
DispatchMessageA
CopyRect
DefWindowProcA
CallWindowProcA
GetMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
MapWindowPoints
EnableMenuItem
CheckMenuItem
SetWindowPos
SetWindowLongA
GetDlgItem
GetMessagePos
GetMessageTime
DestroyWindow
GetTopWindow
TranslateMessage
GetMessageA
SetTimer
MessageBoxA
GetWindow
PostMessageA
GetParent
FindWindowA
GetWindowThreadProcessId
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
EnableWindow
IsWindowEnabled
GetForegroundWindow
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetCapture
WinHelpA
LoadIconA
RegisterWindowMessageA
PostQuitMessage
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
DestroyMenu
ModifyMenuA
GetLastActivePopup
GetWindowLongA
SendMessageA
UnhookWindowsHookEx
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
GetSystemMetrics
LoadCursorA
GetWindowTextA
ValidateRect
PeekMessageA
IsWindow
GetFocus
ClientToScreen
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
SetWindowsHookExA
CallNextHookEx
GetKeyState
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetStockObject
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
DeleteObject
CreateBitmap
GetClipBox
DeleteDC
SetBkColor
SetTextColor
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
SetEntriesInAclA
SetNamedSecurityInfoA
RegOpenKeyA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
LookupPrivilegeValueA
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
OpenProcessToken
GetTokenInformation
CryptEncrypt
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptDeriveKey
CryptDecrypt
CryptDestroyHash
CryptReleaseContext
shell32
ShellExecuteA
ShellExecuteExA
oleaut32
VariantInit
VariantChangeType
VariantClear
shlwapi
PathRemoveFileSpecA
urlmon
URLDownloadToFileA
ws2_32
inet_addr
select
htons
getsockname
WSAStartup
recv
socket
closesocket
send
connect
getpeername
setsockopt
oleacc
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ