Static task
static1
Behavioral task
behavioral1
Sample
929a3ecf9b2e6067650d796a02be3d2f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
929a3ecf9b2e6067650d796a02be3d2f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
929a3ecf9b2e6067650d796a02be3d2f_JaffaCakes118
-
Size
471KB
-
MD5
929a3ecf9b2e6067650d796a02be3d2f
-
SHA1
667e62fba674f62099d116d5d5c724c2f55b3652
-
SHA256
9d20f3273d67668fcf59d481d680f4bd4581373c90d7c91b4854666365bcab03
-
SHA512
54ed879d5b6418e890408e14c858f201cc49356c8b3acb4cf8e10f529b05c6c082af217dc50445f0bd2e63e6e1e8761fb1debcca2c23f8e704f63afe577169e2
-
SSDEEP
12288:xixkSFttgCCqf1aqc+b1YAUI11TJUjzPH:4PfgCCEaq917UYSv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 929a3ecf9b2e6067650d796a02be3d2f_JaffaCakes118
Files
-
929a3ecf9b2e6067650d796a02be3d2f_JaffaCakes118.exe windows:4 windows x86 arch:x86
5350f6a0a751924bf9a24b7e7ede7065
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
user32
EnableMenuItem
SetWindowTextW
GetWindow
GetTopWindow
IsWindowVisible
DispatchMessageW
GetPropW
GetMenuItemCount
IntersectRect
GetClassNameW
ValidateRect
GetFocus
GetWindowRect
ScreenToClient
GetDesktopWindow
SetCursor
MapWindowPoints
ClientToScreen
MonitorFromWindow
GetSubMenu
GetDlgCtrlID
GrayStringW
KillTimer
DestroyMenu
LoadBitmapW
GetParent
PeekMessageW
CreatePopupMenu
SetActiveWindow
GetKeyState
DestroyIcon
SetForegroundWindow
GetSysColor
GetSystemMetrics
SetMenuItemInfoW
GetCapture
IsWindowEnabled
CheckMenuItem
LoadCursorW
GetForegroundWindow
RemovePropW
SetWindowsHookExW
IsRectEmpty
RegisterClassW
PostQuitMessage
EndDialog
BeginPaint
ReleaseDC
PtInRect
SetPropW
CharUpperW
SetTimer
CharToOemA
GetClientRect
EndPaint
IsWindow
GetWindowThreadProcessId
IsDialogMessageW
RealChildWindowFromPoint
GetDC
InvalidateRect
UpdateWindow
GetSysColorBrush
GetCursorPos
MessageBoxW
LoadIconW
CopyRect
TrackPopupMenu
EnableWindow
SetWindowPos
CreateWindowExW
RegisterWindowMessageW
GetDlgItem
EqualRect
GetMessageTime
GetClassInfoExW
GetMessagePos
GetMenuCheckMarkDimensions
GetLastActivePopup
GetNextDlgTabItem
ShowWindow
SetFocus
GetMenu
GetClassLongW
DrawTextExW
GetWindowLongW
winspool.drv
ExtDeviceMode
shell32
ShellExecuteW
SHSetUnreadMailCountW
SHExtractIconsW
ole32
CoInitialize
CoFreeUnusedLibraries
CLSIDFromString
CoCreateInstance
CoCreateGuid
CoUninitialize
advapi32
RegDeleteKeyW
RegQueryValueExW
RegEnumKeyExW
RegOpenKeyExW
RegCloseKey
RegSetValueW
RegDeleteValueW
RegCreateKeyW
RegEnumKeyW
shlwapi
PathRemoveFileSpecW
PathFindExtensionW
PathFindFileNameW
PathIsUNCW
kernel32
GetCPInfo
CreateEventW
GetFullPathNameW
HeapSize
TlsFree
GlobalHandle
SetFileTime
WriteConsoleW
GetACP
SetFileAttributesW
GetModuleFileNameA
LocalFree
GetConsoleCP
GetCommandLineA
WriteFile
DeleteTimerQueueTimer
RaiseException
GetFileSize
GlobalLock
GetCurrentProcess
lstrcmpA
EnumSystemLocalesW
GetModuleHandleW
GetCurrentThreadId
LocalReAlloc
MoveFileW
InitializeCriticalSection
SwitchToThread
FormatMessageW
GetEnvironmentStringsW
Sleep
WaitForSingleObject
GetPrivateProfileStringW
VirtualProtect
FindClose
SetUnhandledExceptionFilter
CreateTimerQueueTimer
FreeResource
GetThreadPriority
ExitProcess
DeleteCriticalSection
CreateTimerQueue
SetLastError
LCMapStringW
GetModuleFileNameW
GetUserDefaultLCID
SetThreadAffinityMask
VirtualFree
ReadConsoleW
WaitForSingleObjectEx
SetEndOfFile
GetModuleHandleExW
EnterCriticalSection
QueryPerformanceCounter
FileTimeToSystemTime
GlobalFree
LockFile
RemoveDirectoryW
GetModuleHandleA
DuplicateHandle
CloseHandle
SizeofResource
GetStdHandle
FindResourceW
CreateFileW
IsDBCSLeadByteEx
FreeEnvironmentStringsW
LocalAlloc
GetLongPathNameW
GetSystemDirectoryW
LocalFileTimeToFileTime
AreFileApisANSI
HeapAlloc
WritePrivateProfileStringW
FindNextFileW
GlobalReAlloc
GlobalAddAtomW
InterlockedIncrement
GetLastError
OutputDebugStringW
SetThreadPriority
LoadResource
LoadLibraryA
GetFileAttributesExW
IsDBCSLeadByte
FileTimeToLocalFileTime
SetStdHandle
CreateThread
GetFileTime
UnlockFile
GlobalUnlock
SetFilePointer
SignalObjectAndWait
ReadFile
GetProcessAffinityMask
HeapReAlloc
LeaveCriticalSection
HeapFree
CreateDirectoryW
FindFirstFileW
TlsGetValue
SystemTimeToFileTime
DeleteFileW
FindFirstChangeNotificationW
SetEvent
TlsSetValue
GetShortPathNameW
InitializeSListHead
OutputDebugStringA
GetFileSizeEx
GetVolumeInformationW
MulDiv
GetProcessHeap
FindCloseChangeNotification
IsDebuggerPresent
GetProcAddress
GetCurrentThread
GlobalAlloc
LockResource
GlobalFlags
lstrcmpW
GetFileType
GetStringTypeW
LoadLibraryW
GetFileAttributesW
GetLocaleInfoW
gdi32
ScaleViewportExtEx
GetClipBox
DeleteObject
SelectObject
CreateBitmap
SetBkMode
GetTextExtentPoint32W
SetViewportExtEx
RestoreDC
ScaleWindowExtEx
SetViewportOrgEx
GetStockObject
SetTextColor
SetWindowExtEx
TranslateCharsetInfo
SetBkColor
BeginPath
SaveDC
SetMapMode
CreatePen
Sections
.text Size: 78KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 205KB - Virtual size: 205KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 163KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 1024B - Virtual size: 768B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ