Static task
static1
Behavioral task
behavioral1
Sample
0fa9df10a174477ae8f246d7904881db_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0fa9df10a174477ae8f246d7904881db_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0fa9df10a174477ae8f246d7904881db_JaffaCakes118
-
Size
812KB
-
MD5
0fa9df10a174477ae8f246d7904881db
-
SHA1
a7f6d15aa74002fc6dac3fbe0411515e498affa3
-
SHA256
9c36c55a75d38e5ace42cd804e1dfaacfae1b29da780a6a74838d1f177f0b842
-
SHA512
9a1098cf86bf63151f7989aacfc19886e03ac7c7f1b47eae34717d2b6b7a1bf896dfc437487ed65152936a1c0742f76426ef1e2f822f5ebe79f86a2c8e740ae7
-
SSDEEP
24576:qggeIHpFmZqAgG4Mwb/rHV79VqZE7bSD6Hx8:qgHCJDHY2fSDIx8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 0fa9df10a174477ae8f246d7904881db_JaffaCakes118
Files
-
0fa9df10a174477ae8f246d7904881db_JaffaCakes118.exe windows:4 windows x86 arch:x86
570dc411e6aeea4a61f8481ca143d959
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetEnvironmentStrings
HeapDestroy
HeapCreate
VirtualFree
IsValidLocale
IsValidCodePage
EnumSystemLocalesA
UnhandledExceptionFilter
FreeEnvironmentStringsW
FreeEnvironmentStringsA
SetUnhandledExceptionFilter
SetStdHandle
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
IsBadCodePtr
GetLocaleInfoW
SetEnvironmentVariableA
GlobalLock
GetUserDefaultLCID
LCMapStringW
LocalFree
WaitForSingleObject
ResetEvent
lstrlenA
lstrcpyA
MultiByteToWideChar
GetFileAttributesA
FindFirstFileA
FindNextFileA
FindClose
SetFileAttributesA
RemoveDirectoryA
DeleteFileA
LoadLibraryA
GetProcAddress
GetDiskFreeSpaceA
FormatMessageA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetCurrentThread
GetLastError
GetCurrentProcess
CloseHandle
GetVersionExA
GetModuleHandleA
GetModuleFileNameA
GetFullPathNameA
DeleteCriticalSection
InterlockedExchange
GetProfileStringA
LCMapStringA
GetACP
HeapSize
HeapReAlloc
HeapFree
ExitThread
CreateThread
GetDriveTypeA
HeapAlloc
RaiseException
GetLocalTime
IsBadReadPtr
TerminateProcess
Sleep
GetSystemTime
GetTimeZoneInformation
GetStartupInfoA
ExitProcess
GetCommandLineA
GlobalSize
RtlUnwind
CopyFileA
GetOEMCP
SetErrorMode
SizeofResource
TlsGetValue
GetCPInfo
GlobalFlags
GlobalReAlloc
LocalReAlloc
TlsSetValue
TlsAlloc
TlsFree
GlobalHandle
GetShortPathNameA
LocalAlloc
GetProcessVersion
GetVolumeInformationA
GetThreadLocale
GetStringTypeExA
UnlockFile
MoveFileA
SetEndOfFile
DuplicateHandle
LockFile
FlushFileBuffers
SystemTimeToFileTime
FileTimeToSystemTime
lstrlenW
GetTempFileNameA
GetFileSize
GetFileTime
GetTickCount
GetProfileIntA
MulDiv
GetPrivateProfileIntA
WritePrivateProfileStringA
GetPrivateProfileStringA
SetThreadPriority
lstrcmpA
SuspendThread
InterlockedIncrement
ResumeThread
InterlockedDecrement
LoadResource
FreeLibrary
FindResourceA
GlobalFindAtomA
LockResource
lstrcmpiA
lstrcpynA
GlobalDeleteAtom
lstrcatA
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
FileTimeToLocalFileTime
GetCurrentThreadId
SetLastError
WideCharToMultiByte
FileTimeToDosDateTime
EnterCriticalSection
LocalFileTimeToFileTime
LeaveCriticalSection
DosDateTimeToFileTime
SetFileTime
SetFilePointer
ReadFile
CreateFileA
WriteFile
GetLocaleInfoA
SetEvent
GlobalUnlock
GetExitCodeThread
GetTempPathA
WinExec
TerminateThread
InitializeCriticalSection
CreateEventA
GlobalAlloc
CreateDirectoryA
GlobalFree
CompareStringA
CompareStringW
user32
GetNextDlgTabItem
SetWindowTextA
IsDlgButtonChecked
CheckRadioButton
MapWindowPoints
GetSysColor
AdjustWindowRectEx
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
ScrollWindow
GetScrollInfo
SetScrollInfo
ShowScrollBar
GetScrollRange
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
IsChild
RegisterClassA
TrackPopupMenu
EnableMenuItem
DestroyWindow
CreateWindowExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetSystemMetrics
BringWindowToTop
IsWindowVisible
IsIconic
EqualRect
CopyRect
SetWindowLongA
GetKeyState
SetWindowPos
GetDlgCtrlID
GetMenuItemCount
GetMenuItemID
GetWindowTextLengthA
DefWindowProcA
SetActiveWindow
SetMenuItemBitmaps
CheckMenuItem
GetMenu
wvsprintfA
GetSysColorBrush
SetFocus
ShowWindow
IsWindow
GetWindow
IsWindowEnabled
TranslateAcceleratorA
LoadAcceleratorsA
SetRectEmpty
RegisterWindowMessageA
ScreenToClient
ClientToScreen
GetWindowLongA
WindowFromPoint
GetActiveWindow
GetWindowThreadProcessId
GetDesktopWindow
SetCursor
PeekMessageA
GetCursorPos
WaitMessage
GetCapture
GetFocus
GetLastActivePopup
CharToOemA
GetParent
TranslateMessage
DispatchMessageA
GetMessageA
PostQuitMessage
OpenClipboard
EmptyClipboard
RegisterClipboardFormatA
SetClipboardData
DestroyIcon
GetMenuStringA
InsertMenuA
GetDCEx
InvertRect
FindWindowA
GetClassNameA
CloseClipboard
ReleaseCapture
SetCapture
ModifyMenuA
MessageBeep
LoadMenuA
GetSubMenu
GetWindowRect
PostMessageA
LockWindowUpdate
InvalidateRect
KillTimer
EnableWindow
SetTimer
LoadBitmapA
LoadCursorA
wsprintfA
EndDialog
LoadIconA
SendDlgItemMessageA
SetDlgItemTextA
GetMenuState
GetMenuCheckMarkDimensions
GetTabbedTextExtentA
PostThreadMessageA
WinHelpA
SetMenu
UnpackDDElParam
ReuseDDElParam
CharUpperA
GetDlgItem
LoadStringA
DialogBoxParamA
GetDC
GetClientRect
ReleaseDC
EnumWindows
UpdateWindow
GetWindowTextA
SendMessageA
MessageBoxA
IsClipboardFormatAvailable
FillRect
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
CreateDialogIndirectParamA
ShowOwnedPopups
ValidateRect
SetRect
GetSystemMenu
DeleteMenu
AppendMenuA
IsRectEmpty
SetParent
OemToCharA
DestroyCursor
SetCursorPos
RedrawWindow
InflateRect
IsZoomed
PtInRect
GetClassInfoA
DestroyMenu
SetWindowsHookExA
IsDialogMessageA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
CharNextA
IsWindowUnicode
gdi32
GetObjectA
BitBlt
CreateCompatibleDC
DeleteObject
SetTextColor
SetBkColor
GetClipBox
DeleteDC
StretchDIBits
CreateBitmap
CreateCompatibleBitmap
GetCharWidthA
SelectObject
GetTextMetricsA
PatBlt
CreateFontA
SaveDC
RestoreDC
StartDocA
SetBkMode
SetPolyFillMode
SetStretchBltMode
SetMapMode
SetROP2
OffsetViewportOrgEx
SetViewportExtEx
SetViewportOrgEx
SetWindowOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
SelectClipRgn
SetWindowExtEx
ExcludeClipRect
IntersectClipRect
CreateFontIndirectA
MoveToEx
LineTo
SetTextAlign
GetCurrentPositionEx
CreateRectRgn
GetDeviceCaps
GetViewportExtEx
CreatePen
GetWindowExtEx
CreatePatternBrush
CreateSolidBrush
PtVisible
RectVisible
ExtTextOutA
Escape
TextOutA
DPtoLP
GetViewportOrgEx
Rectangle
EndDoc
EndPage
AbortDoc
SetAbortProc
CreateDCA
StartPage
SetRectRgn
CreateRectRgnIndirect
LPtoDP
GetBkColor
CombineRgn
GetTextColor
GetStretchBltMode
GetNearestColor
GetTextAlign
GetBkMode
GetPolyFillMode
GetTextFaceA
GetWindowOrgEx
GetROP2
CreateDIBitmap
CopyMetaFileA
GetTextExtentPointA
GetStockObject
GetTextExtentPoint32A
comdlg32
GetOpenFileNameA
PrintDlgA
GetFileTitleA
GetSaveFileNameA
CommDlgExtendedError
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegDeleteValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
SetFileSecurityA
GetFileSecurityA
RegCreateKeyA
RegSetValueA
shell32
ExtractIconA
DragFinish
ShellExecuteExA
DragQueryFileA
SHGetFileInfoA
FindExecutableA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
comctl32
ImageList_ReplaceIcon
ord17
ImageList_Destroy
ImageList_LoadImageA
oledlg
ord8
ole32
OleFlushClipboard
CoTaskMemFree
ReleaseStgMedium
OleIsCurrentClipboard
OleGetClipboard
DoDragDrop
CoRegisterMessageFilter
RegisterDragDrop
CoRevokeClassObject
OleUninitialize
OleInitialize
OleDuplicateData
CoTaskMemAlloc
CoFreeUnusedLibraries
CreateStreamOnHGlobal
RevokeDragDrop
CoLockObjectExternal
oleaut32
VariantClear
VarBstrFromDate
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 452KB - Virtual size: 449KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 32KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 168KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.prdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE