Static task
static1
Behavioral task
behavioral1
Sample
0c9fa58d3eaf9d9bcf9176aaa253e9b7_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0c9fa58d3eaf9d9bcf9176aaa253e9b7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0c9fa58d3eaf9d9bcf9176aaa253e9b7_JaffaCakes118
-
Size
7.4MB
-
MD5
0c9fa58d3eaf9d9bcf9176aaa253e9b7
-
SHA1
8c843b3f6b03bef2811d3711fa5302193786a88e
-
SHA256
5bf2f31c5704b1c1609b1ba41504324dc0bbfe0d3ebaabc2331aae3317d6510f
-
SHA512
36f78cc9fc59772ebe5eb90a78ff2ac1078efd83f2b456a528d1203fa9664c6e11619b1ba6c58de8719111a65e0a882962c045c21103c53bc3c9f743b84b1ceb
-
SSDEEP
49152:KFIRFonAZR7pXK5NSDY0sz3tJX2d0QdO2nBiCx5l:DRFonWs3tJX2d0QdO2nBhx5l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c9fa58d3eaf9d9bcf9176aaa253e9b7_JaffaCakes118
Files
-
0c9fa58d3eaf9d9bcf9176aaa253e9b7_JaffaCakes118.exe windows:4 windows x86 arch:x86
dda0b8698d30a0eb83a986a14f8f8648
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
UuidCreate
UuidToStringA
RpcStringFreeA
tcl
Tcl_Clone_Interp
Tcl_CreateInterp
Tcl_ProcCmd
Tcl_FreeList
Tcl_SplitList
Tcl_CreateCommand
Tcl_DeleteInterp
Tcl_GetStringResult
Tcl_DeleteClone
Tcl_SetResult
Tcl_EvalEx
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
GetCurrentThread
LocalAlloc
SearchPathA
CreateProcessA
GetSystemTime
HeapAlloc
WritePrivateProfileStringA
lstrcmpA
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThreadId
GlobalDeleteAtom
SetThreadPriority
SuspendThread
GlobalAddAtomA
GetCurrentProcessId
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
GetModuleFileNameW
GetThreadLocale
SetFilePointer
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
GetPrivateProfileIntA
GetPrivateProfileStringA
InterlockedIncrement
GlobalReAlloc
GlobalHandle
LocalReAlloc
GetCurrentDirectoryA
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
ExpandEnvironmentStringsA
GetTickCount
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapReAlloc
VirtualProtect
VirtualQuery
GetCommandLineA
GetStartupInfoA
ExitThread
CreateThread
RaiseException
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
SetCurrentDirectoryA
SetEnvironmentVariableA
SetStdHandle
GetFileType
ExitProcess
HeapSize
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetDriveTypeA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateNamedPipeA
TerminateProcess
GetSystemInfo
GetFileTime
LeaveCriticalSection
EnterCriticalSection
SetConsoleScreenBufferSize
GetStdHandle
GetConsoleScreenBufferInfo
AllocConsole
DeleteCriticalSection
FreeConsole
InitializeCriticalSection
WriteFile
ReadFile
FlushFileBuffers
TlsFree
TlsGetValue
TlsSetValue
TlsAlloc
ConnectNamedPipe
VirtualFree
VirtualAlloc
DisconnectNamedPipe
GetProcessHeap
HeapFree
lstrcpyA
CreateFileA
GetFileSize
TerminateThread
InterlockedDecrement
lstrcpynA
FileTimeToLocalFileTime
FileTimeToSystemTime
LoadLibraryA
FreeLibrary
GetModuleFileNameA
FormatMessageA
LocalFree
GetSystemDirectoryA
GetTempPathA
GetLocalTime
CreateDirectoryA
GetCurrentProcess
GetVersionExA
SetLastError
Sleep
FindFirstFileA
GetFileAttributesA
FindNextFileA
FindClose
DeleteFileA
MulDiv
GlobalUnlock
ResetEvent
GlobalLock
SetEvent
WaitForSingleObject
CloseHandle
GetWindowsDirectoryA
CreateEventA
GlobalAlloc
ResumeThread
GlobalFree
GetProcAddress
FreeResource
GetModuleHandleA
GetEnvironmentVariableA
lstrlenA
CompareStringW
CompareStringA
GetVersion
GetLastError
MultiByteToWideChar
InterlockedExchange
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
lstrcatA
WinExec
GetLogicalDriveStringsA
CreateFileW
user32
CopyAcceleratorTableA
IsRectEmpty
InvalidateRgn
GetNextDlgGroupItem
RegisterClipboardFormatA
PostThreadMessageA
GetClassNameA
RemovePropA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
UpdateWindow
GetMenu
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetScrollInfo
CallWindowProcA
OffsetRect
IntersectRect
GetWindowPlacement
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetLastActivePopup
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
GetKeyState
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
EnableMenuItem
CheckMenuItem
GetFocus
SetFocus
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
GetWindow
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
TrackMouseEvent
PeekMessageA
DispatchMessageA
TranslateMessage
GetSysColorBrush
SystemParametersInfoA
GetWindowDC
ScreenToClient
ModifyMenuA
EqualRect
IsWindow
DeleteMenu
PtInRect
GetSystemMetrics
LoadIconA
IsIconic
DrawIcon
FindWindowA
GetDesktopWindow
ExitWindowsEx
MessageBoxA
RegisterClassExA
DrawTextA
GetWindowTextA
GetWindowTextLengthA
SendMessageCallbackA
SetCapture
CopyIcon
GetCaretPos
RedrawWindow
CreateWindowExA
EndPaint
BeginPaint
MessageBeep
GetClassLongA
CharNextA
SetWindowContextHelpId
MapDialogRect
DestroyMenu
InflateRect
GrayStringA
DrawTextExA
TabbedTextOutA
RegisterWindowMessageA
WinHelpA
IsChild
IsWindowVisible
SetTimer
CharUpperA
LoadBitmapA
SendMessageA
GetWindowRect
CopyRect
PostMessageA
EnableWindow
GetWindowLongA
KillTimer
SetWindowLongA
SetWindowPos
HideCaret
SetRect
GetCursorPos
LoadMenuA
SetForegroundWindow
GetSubMenu
LoadImageA
SetWindowRgn
GetClientRect
InvalidateRect
GetDC
ReleaseDC
GetParent
SetPropA
GetDlgCtrlID
DefWindowProcA
GetPropA
UnregisterClassA
ReleaseCapture
ClientToScreen
DrawFocusRect
DrawEdge
WindowFromPoint
GetCapture
SetClassLongA
SetCursor
GetSysColor
DestroyCursor
FillRect
LoadCursorA
AdjustWindowRectEx
gdi32
GetCurrentObject
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetCurrentPositionEx
ArcTo
ExtSelectClipRgn
CreateRectRgn
CreatePen
CreateRectRgnIndirect
GetTextExtentPoint32A
GetMapMode
DPtoLP
GetBkColor
GetTextColor
GetRgnBox
GetPixel
CreateSolidBrush
DeleteObject
GetObjectA
MoveToEx
LineTo
SetMapMode
RestoreDC
SaveDC
GetClipBox
GetDIBits
CreateFontA
SetTextColor
SetBkColor
SetBkMode
CreateFontIndirectA
SelectClipRgn
ExtTextOutA
GetTextMetricsA
GetDeviceCaps
DeleteDC
SelectObject
Rectangle
GetStockObject
CreatePatternBrush
CreateCompatibleBitmap
BitBlt
StretchBlt
CombineRgn
CreateCompatibleDC
CreateBitmap
ExtCreateRegion
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comctl32
ord17
_TrackMouseEvent
shlwapi
SHDeleteKeyA
PathIsDirectoryA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
UrlUnescapeA
PathFileExistsA
oledlg
ord8
ole32
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitializeEx
CreateStreamOnHGlobal
OleUninitialize
CoRegisterMessageFilter
OleIsCurrentClipboard
OleFlushClipboard
oleaut32
VariantClear
SysAllocString
VariantChangeType
VariantInit
SysStringLen
SysAllocStringByteLen
SysAllocStringLen
OleCreateFontIndirect
SysFreeString
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleLoadPicture
wininet
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetSetOptionExA
InternetQueryDataAvailable
zlib
inflateEnd
inflate
inflateInit2_
msimg32
GradientFill
Sections
.text Size: 756KB - Virtual size: 754KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 250KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 60KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6.4MB - Virtual size: 6.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ