Static task
static1
Behavioral task
behavioral1
Sample
9a566b4c059f8a656edbce5848794074_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9a566b4c059f8a656edbce5848794074_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
9a566b4c059f8a656edbce5848794074_JaffaCakes118
-
Size
1.9MB
-
MD5
9a566b4c059f8a656edbce5848794074
-
SHA1
d62aac9fbcd40b39a6a64147dd63b314c15c1f18
-
SHA256
1ed38d34149e4dab34c0fae63b684b8d307ed49323593258e6b12a12cdc7657f
-
SHA512
72dcc2e510296f3ef8b3a72be10a4491a4a20024b71556b7ee1c8c3ae334c6ab405b67a105e9ad9ca8065470173f850d4cc8b15b6847217878ac8d2c38c5a918
-
SSDEEP
49152:8TYZHRtqSZdVH88BseEz31Ln5vipmLYuNDA8QeqAjc8ubOBH:88bl5LBq5viMLv3KbOBH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 9a566b4c059f8a656edbce5848794074_JaffaCakes118
Files
-
9a566b4c059f8a656edbce5848794074_JaffaCakes118.exe windows:5 windows x86 arch:x86
6f63ef9b0481a5dda9260b274916ab69
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempPathA
GetThreadContext
GetThreadLocale
GetThreadPriority
GetTickCount
GetUserDefaultUILanguage
GetVersion
GetVersionExA
GetVersionExW
GetVolumeInformationA
GetVolumeInformationW
GetWindowsDirectoryA
GetWindowsDirectoryW
GlobalAlloc
GlobalDeleteAtom
GlobalFlags
GlobalFree
GlobalHandle
GlobalLock
GlobalMemoryStatus
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
IsBadStringPtrW
IsBadWritePtr
IsDebuggerPresent
IsValidLocale
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LocalSize
LockResource
MapViewOfFile
MulDiv
MultiByteToWideChar
OpenFileMappingA
OpenFileMappingW
OpenProcess
OutputDebugStringW
Process32NextW
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadFile
ReadProcessMemory
ReleaseMutex
RemoveDirectoryA
ResetEvent
ResumeThread
RtlUnwind
GetSystemTimeAsFileTime
SetConsoleDisplayMode
SetEndOfFile
SetEvent
SetFileAttributesA
SetFilePointer
SetLastError
SetProcessWorkingSetSize
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SuspendThread
SystemTimeToFileTime
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
UpdateResourceA
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WriteConsoleOutputCharacterA
WriteConsoleW
WriteFile
WritePrivateProfileStringW
WriteProfileStringA
lstrcat
lstrcatW
lstrcmpA
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlen
lstrlenW
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
IsValidCodePage
GetCPInfo
InitializeCriticalSectionAndSpinCount
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
GetSystemTime
GetSystemDirectoryW
GetSystemDirectoryA
GetStartupInfoA
GetProcessAffinityMask
GetProcAddress
GetPrivateProfileStringW
GetPriorityClass
GetOEMCP
GetModuleHandleW
GetModuleFileNameW
GetModuleFileNameA
GetLocaleInfoW
GetLocaleInfoA
GetLocalTime
GetLastError
GetHandleInformation
GetFileTime
GetFileSize
GetFileAttributesW
GetFileAttributesA
GetDriveTypeW
GetDiskFreeSpaceA
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetConsoleScreenBufferInfo
GetComputerNameW
GetComputerNameA
GetCommandLineW
GetCommandLineA
GetCalendarInfoW
GetBinaryTypeA
GetAtomNameW
GetACP
FreeResource
FreeLibrary
FormatMessageA
FlushViewOfFile
FindResourceW
FindResourceA
FindNextVolumeW
FindNextVolumeMountPointW
FindNextFileA
FindFirstVolumeMountPointW
FindFirstFileA
FindClose
FindAtomW
FileTimeToSystemTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExpandEnvironmentStringsW
ExpandEnvironmentStringsA
ExitThread
ExitProcess
EnumDateFormatsW
EnumCalendarInfoExW
EnterCriticalSection
DuplicateHandle
DeleteFileW
DeleteFileA
DeleteCriticalSection
DeleteAtom
CreateTimerQueueTimer
CreateThread
CreateRemoteThread
CreateProcessW
CreateProcessA
CreatePipe
CreateMutexW
CreateMutexA
CreateFileW
CreateFileMappingW
CreateFileMappingA
CreateFileA
CreateEventW
CreateEventA
CreateDirectoryA
CopyFileA
ConnectNamedPipe
CloseHandle
CallNamedPipeA
BuildCommDCBAndTimeoutsW
Beep
AddAtomW
GetModuleHandleA
SetErrorMode
SetCommConfig
VirtualAlloc
user32
SetFocus
SetForegroundWindow
SetMenuDefaultItem
SetMenuItemInfoA
SetProcessWindowStation
SetRect
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
SwitchDesktop
SystemParametersInfoW
TabbedTextOutA
TileWindows
TrackPopupMenu
TranslateMessage
UnregisterClassW
WindowFromPoint
PeekMessageA
PackDDElParam
OpenClipboard
OffsetRect
MessageBoxA
MessageBeep
LoadMenuA
LoadImageA
LoadCursorW
KillTimer
IsWindowVisible
IsWindow
IsIconic
IsDialogMessageW
InvalidateRgn
InvalidateRect
InflateRect
InSendMessageEx
HiliteMenuItem
GetWindowThreadProcessId
GetWindowTextA
GetWindowRect
GetWindowPlacement
GetWindowLongW
GetWindowLongA
GetWindowDC
GetWindow
GetSystemMenu
GetSysColorBrush
GetSysColor
GetSubMenu
GetMessageW
SetCursor
GetMenuStringW
GetMenuItemID
GetLastInputInfo
GetKeyState
GetIconInfo
GetFocus
GetCursorPos
GetClientRect
GetClassNameW
GetClassNameA
GetClassInfoA
GetCapture
FrameRect
FindWindowW
FillRect
EnumWindows
EndPaint
EnableWindow
EmptyClipboard
DrawTextA
DrawIconEx
DrawFrameControl
DrawFocusRect
DlgDirListComboBoxA
DispatchMessageW
DestroyWindow
DefWindowProcW
DefWindowProcA
DdeSetUserHandle
DdeQueryNextServer
DdeAccessData
CreateWindowExW
CreateWindowExA
CheckDlgButton
ChangeDisplaySettingsExW
CallWindowProcW
CallWindowProcA
BringWindowToTop
BeginPaint
AttachThreadInput
LoadIconA
GetClipboardData
GetDC
GetListBoxInfo
WindowFromDC
GetShellWindow
DestroyCursor
CloseClipboard
GetForegroundWindow
GetDoubleClickTime
DestroyIcon
IsWindowUnicode
GetCursor
SetClipboardData
SetCapture
SetActiveWindow
SendMessageW
SendMessageTimeoutA
SendMessageA
ScreenToClient
RemoveMenu
ReleaseDC
ReleaseCapture
RegisterWindowMessageW
RegisterWindowMessageA
RegisterClassA
PostThreadMessageW
PostThreadMessageA
PostQuitMessage
PostMessageW
PostMessageA
GetMessageA
PeekMessageW
IsGUIThread
IsMenu
GetMenuCheckMarkDimensions
GetDlgCtrlID
IsCharAlphaNumericW
GetAsyncKeyState
GetDesktopWindow
IsWindowEnabled
DrawMenuBar
GetOpenClipboardWindow
CopyIcon
CreatePopupMenu
GetMessageTime
GetActiveWindow
GetParent
GetSystemMetrics
CharNextA
LoadCursorFromFileW
GetMenuItemCount
GetTopWindow
GetDialogBaseUnits
InSendMessage
GetKBCodePage
GetMessagePos
GetKeyboardLayout
ShowCaret
CharLowerA
GetClipboardViewer
CharToOemBuffW
gdi32
CreateDCW
CreateDIBSection
CreateFontA
CreateFontW
CreatePen
CreateRectRgnIndirect
CreateSolidBrush
DeleteObject
EndDoc
EngDeleteClip
EngMarkBandingSurface
GdiConvertMetaFilePict
GdiFlush
GdiPlayPrivatePageEMF
GdiPlayScript
GetClipRgn
GetDeviceCaps
GetObjectW
GetRandomRgn
CreateCompatibleDC
GetStockObject
GetTextExtentPoint32A
GetTextFaceA
GetTextMetricsW
LineTo
MoveToEx
PolyBezier
Polygon
SelectClipRgn
SelectObject
SetBkColor
SetBkMode
SetDIBColorTable
SetMapMode
SetTextColor
StartDocA
StartPage
TextOutA
CreateBrushIndirect
BitBlt
CombineRgn
GetFontLanguageInfo
GetROP2
GetPolyFillMode
GetBkColor
StrokePath
DeleteDC
UnrealizeObject
GetTextColor
CreatePatternBrush
GetObjectType
EndPage
AddFontResourceW
AbortDoc
GetTextAlign
FlattenPath
FillPath
EndPath
WidenPath
DeleteColorSpace
RealizePalette
GetRgnBox
GetColorSpace
CreateHalftonePalette
comdlg32
GetSaveFileNameA
PrintDlgW
advapi32
RegEnumKeyA
RegOpenKeyW
AllocateAndInitializeSid
SetSecurityDescriptorDacl
RegSetValueExA
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
InitializeSecurityDescriptor
GetUserNameW
GetUserNameA
FreeSid
shell32
SHGetPathFromIDListA
Shell_NotifyIcon
ShellExecuteW
ShellExecuteExA
SHCreateDirectoryExA
SHGetDataFromIDListW
SHGetIconOverlayIndexA
SHGetMalloc
Shell_NotifyIconA
SHGetSpecialFolderLocation
SHGetSpecialFolderPathW
SHInvokePrinterCommandA
SHQueryRecycleBinW
ShellExecuteA
shlwapi
StrRStrIW
StrStrIW
StrRChrIW
StrStrW
comctl32
ImageList_Destroy
ImageList_Create
ord17
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ