Static task
static1
Behavioral task
behavioral1
Sample
0d83bd161e5c730bebd011bc4d9bd948_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0d83bd161e5c730bebd011bc4d9bd948_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0d83bd161e5c730bebd011bc4d9bd948_JaffaCakes118
-
Size
193KB
-
MD5
0d83bd161e5c730bebd011bc4d9bd948
-
SHA1
3589d776b9282dcc60a3f594d62f6bdd1bcac799
-
SHA256
f68d09972943e7da1f8d39cab9cce36faef6ae2b25250c703da398622ede2e38
-
SHA512
16830445988e2bf015208b23e262c2728530a45e193f5c77a9574b0fb216dc410052d216dddf03d30e1faa31822b97995afe8190c309f4dacf2bf908faa576e8
-
SSDEEP
3072:el995BzbJ0i69aZU7okTVUfTzaH5vGAMfLu1Oc/3/BzztS2E5n:eH0NsZSx9+aoc/NW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d83bd161e5c730bebd011bc4d9bd948_JaffaCakes118
Files
-
0d83bd161e5c730bebd011bc4d9bd948_JaffaCakes118.exe windows:5 windows x86 arch:x86
4815410d23ae31accd56cd4bd0507b3a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
kernel32
GetModuleHandleA
Sleep
Process32Next
TerminateProcess
OpenProcess
CloseHandle
Process32First
CreateToolhelp32Snapshot
GetVersionExA
CreateThread
GetProcAddress
ExitProcess
GetCurrentProcessId
WriteProcessMemory
CreateProcessA
GetEnvironmentVariableW
Module32First
WaitForSingleObject
CreateEventA
SetUnhandledExceptionFilter
DeleteFileA
CreateProcessW
CreateFileW
WriteFile
CreateFileA
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
LoadLibraryExA
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
LoadResource
HeapCreate
HeapSize
HeapReAlloc
GetStartupInfoA
GetCommandLineA
IsDebuggerPresent
UnhandledExceptionFilter
RtlUnwind
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualProtect
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
GetCPInfo
FindResourceA
SizeofResource
FreeLibrary
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
GlobalAlloc
GlobalLock
GlobalUnlock
GetModuleFileNameA
MulDiv
GetEnvironmentStringsW
lstrcmpA
IsDBCSLeadByte
lstrcmpiA
lstrlenA
InterlockedDecrement
InterlockedIncrement
GetLastError
lstrlenW
WideCharToMultiByte
DeleteCriticalSection
InitializeCriticalSection
MultiByteToWideChar
SetLastError
GetCurrentThreadId
GetTickCount
GetCurrentProcess
FlushInstructionCache
LeaveCriticalSection
EnterCriticalSection
RaiseException
SetHandleCount
user32
GetMenuItemCount
AppendMenuA
DestroyMenu
CreatePopupMenu
DefFrameProcA
LoadStringW
PostQuitMessage
SetMenuDefaultItem
GetMenuItemInfoA
SetMenuItemInfoA
SystemParametersInfoA
GetScrollInfo
SetScrollPos
ScrollWindowEx
UpdateWindow
TranslateMDISysAccel
wsprintfA
RemoveMenu
GetProcessWindowStation
GetUserObjectInformationA
CloseWindowStation
GetWindowRect
MapWindowPoints
FindWindowExW
SetScrollInfo
KillTimer
RegisterWindowMessageA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
GetMonitorInfoA
MonitorFromPoint
TrackPopupMenuEx
UnregisterClassA
PtInRect
GetSubMenu
GetMenuStringA
DrawMenuBar
IsWindowVisible
DefMDIChildProcA
LoadStringA
LoadMenuA
LoadAcceleratorsA
CreateAcceleratorTableA
AdjustWindowRectEx
FindWindowA
IsWindow
SendMessageA
GetDesktopWindow
GetFocus
GetWindow
SetFocus
DestroyAcceleratorTable
BeginPaint
EndPaint
CallWindowProcA
FillRect
ReleaseCapture
GetClassNameA
GetDlgItem
GetParent
IsChild
SetCapture
RedrawWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
ScreenToClient
ClientToScreen
GetClientRect
SetWindowPos
MoveWindow
GetSysColor
LoadImageA
DestroyWindow
CharNextA
DefWindowProcA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
ShowWindow
GetWindowLongA
CreateWindowExA
RegisterClassExA
TranslateAcceleratorA
LoadCursorA
GetClassInfoExA
SetTimer
PostMessageA
SetWindowLongA
BringWindowToTop
MessageBeep
gdi32
SetViewportOrgEx
GetStockObject
GetObjectA
CreateSolidBrush
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteObject
DeleteDC
advapi32
RegOpenKeyExA
RegEnumKeyExA
CreateProcessAsUserA
OpenProcessToken
RegOpenKeyA
RegQueryValueExA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
RegQueryInfoKeyA
RegSetValueExA
QueryServiceStatusEx
ole32
OleInitialize
OleUninitialize
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoUninitialize
CoInitialize
CreateStreamOnHGlobal
oleaut32
SysStringLen
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
VariantClear
VariantInit
VarUI4FromStr
SysAllocString
SysAllocStringLen
SysFreeString
comctl32
InitCommonControlsEx
iphlpapi
GetAdaptersInfo
psapi
GetProcessMemoryInfo
wininet
HttpQueryInfoA
InternetConnectA
InternetSetOptionA
HttpSendRequestA
InternetOpenA
InternetReadFile
HttpOpenRequestA
InternetCloseHandle
Sections
.text Size: 142KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ