Static task
static1
Behavioral task
behavioral1
Sample
0afb4b9ee5ca645cc9de5b57cde577d5_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0afb4b9ee5ca645cc9de5b57cde577d5_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0afb4b9ee5ca645cc9de5b57cde577d5_JaffaCakes118
-
Size
432KB
-
MD5
0afb4b9ee5ca645cc9de5b57cde577d5
-
SHA1
520dad13725371f8ea5230e502a028c0d31ddc58
-
SHA256
6e04111f414ac4829e3a3ea4c901e61632b07ba65f107919c2a4beefeb49af46
-
SHA512
f1d2d8c76b0398994cb18c1a45a3d94bd21e7afb4e6c9ce0375dd3ff000364d8941475a3fc864d7f3336f2df30d0065b83b92c9dbc6b22265c2f46c3d1fa7f34
-
SSDEEP
6144:j9F/F5x09ManR8PG9fqEZlsnasVYkPEvTPparuWcHboST:T/F5+ME8PAunLVhMvTPp3/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0afb4b9ee5ca645cc9de5b57cde577d5_JaffaCakes118
Files
-
0afb4b9ee5ca645cc9de5b57cde577d5_JaffaCakes118.exe windows:4 windows x86 arch:x86
0971fe77a9f237d7fb1a929d1d2bd5b2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
UuidCreate
kernel32
lstrcmpW
GlobalFlags
GetVersionExA
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
InterlockedExchange
CompareStringA
GetLocaleInfoW
RtlUnwind
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCommandLineA
HeapAlloc
GetProcessHeap
GetStartupInfoA
HeapReAlloc
HeapSize
ExitProcess
Sleep
HeapDestroy
VirtualFree
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
SetHandleCount
GetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
GetModuleHandleA
GetFileTime
GetFileAttributesW
GetVersion
InterlockedDecrement
GetModuleHandleW
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
ReleaseSemaphore
CreateSemaphoreW
CreateFileW
GetFullPathNameW
GetVolumeInformationW
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
SetLastError
LocalFree
GetSystemTime
GetCurrentDirectoryW
SetCurrentDirectoryW
OutputDebugStringW
GetLocalTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentThreadId
FormatMessageW
FindFirstFileW
FindNextFileW
FindClose
FreeLibrary
LoadLibraryW
GetProcAddress
CompareStringW
GetVersionExW
WideCharToMultiByte
lstrlenW
lstrlenA
lstrcpynW
GetTempFileNameW
GetTempPathW
GetModuleFileNameW
ReleaseMutex
WaitForSingleObject
CloseHandle
CreateMutexW
InterlockedCompareExchange
GetCurrentProcessId
InterlockedIncrement
MultiByteToWideChar
LoadResource
LockResource
SizeofResource
FindResourceW
GetLastError
HeapCreate
user32
PostQuitMessage
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
LoadIconW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageW
CreateWindowExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetWindowPos
SetWindowLongW
GetDlgItem
GetFocus
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
SetWindowTextW
GetClassInfoExW
SetWindowsHookExW
CallNextHookEx
DispatchMessageW
GetKeyState
PeekMessageW
ValidateRect
ClientToScreen
GrayStringW
DrawTextExW
CopyRect
DrawTextW
TabbedTextOutW
GetWindowTextW
LoadCursorW
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
GetWindowThreadProcessId
SendMessageW
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
CharUpperW
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
IsWindow
IsWindowVisible
GetActiveWindow
MessageBoxW
EnableWindow
EnumThreadWindows
RegisterWindowMessageW
GetWindow
UnregisterClassA
gdi32
DeleteDC
CreateBitmap
GetStockObject
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
GetDeviceCaps
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
TextOutW
comdlg32
GetFileTitleW
GetOpenFileNameW
GetSaveFileNameW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
RegCreateKeyExW
RegEnumValueW
RegSetValueExW
RegQueryValueExW
RegQueryValueExA
RegCloseKey
RegOpenKeyExW
ole32
StringFromGUID2
oleaut32
VariantInit
VariantClear
VariantChangeType
shlwapi
PathStripToRootW
PathFindFileNameW
PathIsUNCW
Sections
.text Size: 328KB - Virtual size: 324KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ