Static task
static1
Behavioral task
behavioral1
Sample
a362450bd0ca83110c1509f09497f76c_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a362450bd0ca83110c1509f09497f76c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
a362450bd0ca83110c1509f09497f76c_JaffaCakes118
-
Size
347KB
-
MD5
a362450bd0ca83110c1509f09497f76c
-
SHA1
6d417bccb8e80cceac70be15040e82a0a3471b82
-
SHA256
fb8faabbb27afe1fcae20d8d1d10896d484c42bc7bd714bf5ed4fb783945f0fa
-
SHA512
c3cc44e6f6ba42fb97c1c7b313f1f273306c2d600e59388a8830fee4eec6c3dd1844a2a353a33157726a75ccc5b18975a7ba76c78f519adfc0f059c7f74e6c05
-
SSDEEP
6144:Zul3JU9DhrPjzXZxOMhb2ZLWc4pPLJahf5WbQlFIJ8WDamSETrNVD2Og0z2Wov:ZulEhriMYZLWcKPVa5UO6J8Wum9TrX2h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource a362450bd0ca83110c1509f09497f76c_JaffaCakes118
Files
-
a362450bd0ca83110c1509f09497f76c_JaffaCakes118.exe windows:5 windows x86 arch:x86
4623bd6a6afe337759dc4d5e35454e00
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetClientRect
BeginPaint
DefWindowProcA
FillRect
InvalidateRect
EnableWindow
GetDC
LoadImageA
SetWindowLongA
DrawTextA
EndPaint
SendMessageA
GetScrollRange
DeleteMenu
FindWindowA
CharToOemBuffW
GetMessageA
SetFocus
IsWindowUnicode
KillTimer
MessageBoxW
DialogBoxParamW
CreateDialogParamW
GetWindowTextW
GetWindowTextLengthW
PostMessageA
CreateWindowExW
RegisterClassW
GetWindowTextA
GetWindowTextLengthA
LoadStringW
LoadStringA
CharToOemA
CharLowerW
CharUpperW
CharLowerA
CharUpperA
CharPrevExA
SetWindowTextW
DefWindowProcW
GetWindowWord
SetWindowWord
SetRect
LoadCursorW
GetLastActivePopup
PostMessageW
SendMessageW
SetDlgItemTextW
OemToCharA
GetWindowLongW
SetWindowLongW
GetKeyState
PeekMessageW
TranslateMessage
DispatchMessageW
GetParent
SendDlgItemMessageW
UpdateWindow
GetDlgItemTextW
SetActiveWindow
AnyPopup
GetWindow
ScrollDC
GetGuiResources
GetProcessWindowStation
GetWindowDC
OpenIcon
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
ShowWindow
shell32
SHBrowseForFolderA
CommandLineToArgvW
ole32
CreateILockBytesOnHGlobal
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
advapi32
GetFileSecurityW
RegDeleteValueW
gdi32
SetViewportOrgEx
GetTextCharsetInfo
PlayMetaFile
PatBlt
GetObjectW
GetLogColorSpaceA
Pie
RoundRect
ScaleViewportExtEx
GetWindowExtEx
GetBkColor
SelectClipPath
SaveDC
TranslateCharsetInfo
CombineTransform
GetEnhMetaFileDescriptionW
GetCharWidthFloatW
SetBitmapDimensionEx
GetDIBits
GetCharWidth32A
GetFontData
GetTextExtentPointA
dbghelp
UnDecorateSymbolName
crypt32
CryptMsgGetParam
CryptHashToBeSigned
CertFreeCertificateContext
comctl32
ord17
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
netapi32
NetConnectionEnum
kernel32
GetLocaleInfoA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
SetConsoleCtrlHandler
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
HeapCreate
HeapDestroy
HeapReAlloc
FatalAppExitA
InitializeCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
WaitForMultipleObjects
VirtualAlloc
VirtualFree
WideCharToMultiByte
GetModuleFileNameW
AreFileApisANSI
LoadLibraryExW
LoadLibraryW
FormatMessageA
LocalFree
FormatMessageW
SetFileAttributesW
RemoveDirectoryW
MoveFileW
CreateDirectoryW
DeleteFileW
GetFullPathNameW
GetCurrentDirectoryA
SetCurrentDirectoryW
GetCurrentDirectoryW
SearchPathW
GetTempPathW
GetTempFileNameW
RaiseException
GetLocaleInfoW
GetDiskFreeSpaceExW
GetLogicalDriveStringsA
GetLogicalDriveStringsW
FindFirstFileW
FindNextFileW
FindCloseChangeNotification
FindFirstChangeNotificationA
FindFirstChangeNotificationW
CreateFileW
SetEndOfFile
CreateEventA
GetStdHandle
EnterCriticalSection
LeaveCriticalSection
GetVersionExA
GetCommandLineW
HeapAlloc
HeapFree
GetProcessHeap
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
GetCurrentThread
TerminateProcess
IsDebuggerPresent
GetConsoleMode
LocalFileTimeToFileTime
DosDateTimeToFileTime
LocalAlloc
GlobalHandle
GlobalMemoryStatus
GetVersionExW
GetSystemTime
CreateProcessW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetVolumeInformationW
FlushFileBuffers
GetConsoleCP
SetStdHandle
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetTimeZoneInformation
CompareStringA
SetEnvironmentVariableA
CompareStringW
OpenFile
ExitThread
SetPriorityClass
SetFilePointerEx
lstrcmpW
CreateEventW
EnumResourceNamesW
InterlockedIncrement
HeapSetInformation
FileTimeToSystemTime
FileTimeToLocalFileTime
FindResourceExW
ReleaseSemaphore
GetSystemDirectoryW
GetModuleHandleW
GetWindowsDirectoryW
GetExitCodeProcess
GetLocalTime
GetEnvironmentVariableW
GetDriveTypeW
GetStartupInfoW
SetFileValidData
ConvertFiberToThread
GetTempPathA
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
MulDiv
ReadFile
WriteFile
GetPrivateProfileStringA
WritePrivateProfileStringA
MultiByteToWideChar
FreeLibrary
GetProcAddress
LoadLibraryExA
GetModuleHandleA
WaitForSingleObject
GlobalAlloc
GlobalFree
ExpandEnvironmentStringsA
lstrcmpA
lstrcmpiA
CloseHandle
GetVersion
GetSystemDirectoryA
lstrcatA
lstrlenA
GetTempFileNameA
CreateFileA
RemoveDirectoryA
CreateProcessA
CreateThread
GlobalLock
GlobalUnlock
GetDiskFreeSpaceA
lstrcpynA
LoadLibraryA
SetErrorMode
GetCommandLineA
SetFileTime
GetWindowsDirectoryA
ExitProcess
CopyFileA
GetCurrentProcess
GetModuleFileNameA
GetFileSize
GetTickCount
Sleep
SetFileAttributesA
CreateDirectoryA
GetLastError
GetFileAttributesA
SetCurrentDirectoryA
MoveFileA
GetFullPathNameA
GetShortPathNameA
SearchPathA
CompareFileTime
ConvertThreadToFiber
GetFileInformationByHandle
RtlCaptureStackBackTrace
SetLastError
DeleteAtom
Sections
.rnjkbsr Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.kjghfui Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.UIKYHGT Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 339KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 209KB - Virtual size: 209KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ