Static task
static1
Behavioral task
behavioral1
Sample
0a138ee0d3673d5184e52e8e528d6a27_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0a138ee0d3673d5184e52e8e528d6a27_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0a138ee0d3673d5184e52e8e528d6a27_JaffaCakes118
-
Size
420KB
-
MD5
0a138ee0d3673d5184e52e8e528d6a27
-
SHA1
dfc8c44ae8ffe0e08c8e696764fc4521f09de213
-
SHA256
275bc83e95b8729ea968cb324133a389ffd0f5c9986e66d66dd52411f5e139a4
-
SHA512
7c5a70c67e8889ac78b6fd6cc946843a7f888b38a206576e40cb82cd14fcd5abf45954c78f152fe8f67fd7037aab9d7189d9ce774f017bfa21fce8f80c3673ef
-
SSDEEP
6144:TIQ39/MRC0treIl19QRQOVIT9ZvHQIP82ZPrm8oG:UQ39/NbI/gIzvHZ02Zay
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a138ee0d3673d5184e52e8e528d6a27_JaffaCakes118
Files
-
0a138ee0d3673d5184e52e8e528d6a27_JaffaCakes118.exe windows:4 windows x86 arch:x86
15014073b98c3bd2cc29dc2b4904c3c0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
UuidCreate
kernel32
GetModuleHandleA
GetVersionExA
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
InterlockedExchange
CompareStringA
GetLocaleInfoW
RtlUnwind
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCommandLineA
HeapAlloc
GetProcessHeap
GetStartupInfoA
HeapReAlloc
HeapSize
ExitProcess
Sleep
HeapDestroy
HeapCreate
VirtualFree
GlobalFlags
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
SetHandleCount
GetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
lstrcmpW
GetFileTime
GetFileAttributesW
GetVersion
InterlockedDecrement
GetModuleHandleW
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
CreateFileW
GetFullPathNameW
GetVolumeInformationW
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
SetLastError
LocalFree
GetSystemTime
GetCurrentDirectoryW
SetCurrentDirectoryW
OutputDebugStringW
GetLocalTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentThreadId
FormatMessageW
FindFirstFileW
FindNextFileW
FindClose
FreeLibrary
LoadLibraryW
GetProcAddress
CompareStringW
GetVersionExW
WideCharToMultiByte
lstrlenW
lstrlenA
lstrcpynW
GetTempFileNameW
GetTempPathW
GetModuleFileNameW
ReleaseMutex
WaitForSingleObject
CloseHandle
CreateMutexW
InterlockedCompareExchange
GetCurrentProcessId
InterlockedIncrement
MultiByteToWideChar
LoadResource
LockResource
SizeofResource
FindResourceW
GetLastError
user32
PostQuitMessage
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
RegisterWindowMessageW
LoadIconW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetWindowPos
SetWindowLongW
GetDlgItem
PostMessageW
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
SetWindowTextW
SetWindowsHookExW
CallNextHookEx
DispatchMessageW
GetKeyState
PeekMessageW
ValidateRect
GetWindowTextW
LoadCursorW
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
GetWindowThreadProcessId
SendMessageW
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
CharUpperW
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
IsWindow
IsWindowVisible
GetActiveWindow
MessageBoxW
EnableWindow
EnumThreadWindows
UnregisterClassA
gdi32
DeleteDC
CreateBitmap
GetStockObject
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
GetDeviceCaps
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
TextOutW
comdlg32
GetFileTitleW
GetOpenFileNameW
GetSaveFileNameW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
RegCreateKeyExW
RegEnumValueW
RegSetValueExW
RegQueryValueExW
RegQueryValueExA
RegCloseKey
RegOpenKeyExW
ole32
StringFromGUID2
oleaut32
VariantInit
VariantClear
VariantChangeType
shlwapi
PathStripToRootW
PathFindFileNameW
PathIsUNCW
Sections
.text Size: 316KB - Virtual size: 315KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ