Static task
static1
Behavioral task
behavioral1
Sample
0cd1f737ffdff83f074d376dff7154dc_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0cd1f737ffdff83f074d376dff7154dc_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0cd1f737ffdff83f074d376dff7154dc_JaffaCakes118
-
Size
1021KB
-
MD5
0cd1f737ffdff83f074d376dff7154dc
-
SHA1
efb40f07bf86a36fbea36a68798933967200754e
-
SHA256
9639db738373ce25f5f311f818407251af22669968d0a7d5ebd7004917467e69
-
SHA512
9189d6b04fbc9fd0fb4077b0e6473c78a7eed9d6fc346cd23d99335238ad4c667c62e1e3375c3f60561280142a9e17e4c8ac648643418135b858f9901857d2d3
-
SSDEEP
24576:yKCRX6OINw/9Qu0jec75WrUzFQhpPqbBO8V:yJqrw/9Qui7c8QhlE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0cd1f737ffdff83f074d376dff7154dc_JaffaCakes118
Files
-
0cd1f737ffdff83f074d376dff7154dc_JaffaCakes118.exe windows:4 windows x86 arch:x86
bf1f8ae75e05316165aae1a971759b4d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDiskFreeSpaceExW
FlushInstructionCache
SetEvent
CreateEventW
CreateThread
lstrcmpiA
lstrcmpA
CreateFileW
InterlockedDecrement
OutputDebugStringW
DebugBreak
lstrlenA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InterlockedIncrement
GetStartupInfoW
GetModuleHandleW
ReadFile
SetFileTime
SetFilePointer
SetEndOfFile
CreateWaitableTimerW
SetWaitableTimer
HeapDestroy
CancelWaitableTimer
IsBadReadPtr
IsBadWritePtr
TlsSetValue
GetPrivateProfileIntW
FreeResource
FindResourceW
SizeofResource
LoadResource
LockResource
MoveFileW
MultiByteToWideChar
WaitForMultipleObjects
LocalAlloc
FindFirstFileW
FindNextFileW
FindClose
RemoveDirectoryW
GlobalAlloc
GlobalFree
OpenProcess
TerminateProcess
MoveFileExW
InterlockedExchange
RaiseException
GetTickCount
GetTempPathW
GetFileAttributesW
SetFileAttributesW
GetPrivateProfileStringW
GetLocalTime
WritePrivateProfileStringW
CreateDirectoryW
DeleteFileW
GetModuleFileNameW
WriteFile
CopyFileW
InitializeCriticalSection
GetCurrentThreadId
CreateMutexW
GetLastError
WaitForSingleObject
DeviceIoControl
GetCurrentProcess
lstrlenW
GetVersionExW
GetTempFileNameW
GetSystemTime
SystemTimeToFileTime
LoadLibraryA
WideCharToMultiByte
GetProcAddress
Sleep
CreateProcessW
CloseHandle
ResetEvent
FreeLibrary
user32
SetCapture
GetCapture
IsWindowEnabled
FillRect
DrawEdge
GetSystemMetrics
InflateRect
DrawFocusRect
OffsetRect
CreateDialogParamW
UpdateWindow
ReleaseCapture
GetSysColor
EndPaint
BeginPaint
DrawTextW
SetFocus
GetFocus
KillTimer
SetTimer
GetSystemMenu
EnableMenuItem
RedrawWindow
LoadStringW
GetWindow
SystemParametersInfoW
InvalidateRect
GetWindowTextW
GetDlgCtrlID
GetWindowRect
PtInRect
MapWindowPoints
GetParent
GetClientRect
GetMenu
AdjustWindowRectEx
IsWindow
GetDlgItem
SetWindowPos
IsDialogMessageW
CreateWindowExW
CallWindowProcW
GetWindowLongW
SetWindowLongW
GetClassInfoExW
SetCursor
SendMessageTimeoutW
LoadCursorW
ClientToScreen
GetWindowTextLengthW
LoadImageW
wsprintfW
RegisterClassExW
SendMessageW
PostQuitMessage
CharNextW
wvsprintfW
DestroyWindow
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
IsIconic
BringWindowToTop
MessageBoxW
DefWindowProcW
ShowWindow
GetWindowDC
ReleaseDC
CharLowerW
PostMessageW
FindWindowW
GetDesktopWindow
SetWindowTextW
SetForegroundWindow
gdi32
GetBitmapBits
CreateDIBPatternBrushPt
CreateFontW
CreateCompatibleDC
DeleteDC
GetCurrentObject
CreateSolidBrush
SelectObject
SetTextColor
DeleteObject
CreateFontIndirectW
GetObjectW
SetBkMode
GetStockObject
CreateDIBSection
advapi32
RegOpenKeyExW
RegEnumKeyExW
RegQueryValueExW
RegCloseKey
RegOpenKeyW
shell32
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderPathW
ole32
CoCreateInstance
CoTaskMemFree
CreateStreamOnHGlobal
CoInitialize
CoUninitialize
oleaut32
SysAllocStringLen
SysAllocString
SysFreeString
comctl32
ImageList_Create
ImageList_Add
ImageList_SetImageCount
_TrackMouseEvent
ImageList_Draw
ImageList_GetIconSize
InitCommonControlsEx
msimg32
AlphaBlend
shlwapi
StrStrIW
PathFileExistsW
PathAppendW
PathGetDriveNumberW
PathIsDirectoryW
SHGetValueW
SHSetValueW
SHDeleteValueW
SHGetValueA
PathIsDirectoryEmptyW
SHDeleteKeyW
PathRemoveFileSpecW
PathMatchSpecW
msvcrt
strcpy
_snprintf
memcmp
_controlfp
__set_app_type
__p__fmode
_strlwr
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
sprintf
strcat
wcslen
_wcsicmp
memset
memcpy
strlen
_wtoi
wcschr
isprint
isspace
tolower
wcsstr
wcscmp
wcsncpy
??2@YAPAXI@Z
_snwprintf
realloc
memmove
free
iswdigit
_vsnwprintf
strncpy
malloc
__CxxFrameHandler
_vsnprintf
_except_handler3
strncat
_purecall
fclose
fwrite
_wfopen
wcsrchr
_ftol
wcscat
_wcsnicmp
swscanf
wcscpy
_beginthreadex
_wtol
_ui64tow
time
wcsncat
_wtoi64
netapi32
Netbios
wininet
GetUrlCacheEntryInfoW
InternetCrackUrlW
InternetSetOptionW
InternetQueryOptionW
FtpCommandW
InternetGetLastResponseInfoW
InternetWriteFile
FtpOpenFileW
HttpEndRequestW
CreateUrlCacheEntryW
InternetReadFileExA
InternetSetStatusCallbackW
InternetSetOptionA
InternetConnectW
HttpSendRequestExW
HttpOpenRequestW
FtpGetFileSize
HttpQueryInfoW
InternetCloseHandle
CommitUrlCacheEntryW
InternetOpenW
InternetReadFile
psapi
EnumProcessModules
EnumProcesses
GetModuleBaseNameW
GetModuleFileNameExW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
urlmon
ObtainUserAgentString
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.3MB - Virtual size: 3.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ