Static task
static1
Behavioral task
behavioral1
Sample
14728b08fa8f6211901657ee4b894a32_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
14728b08fa8f6211901657ee4b894a32_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
14728b08fa8f6211901657ee4b894a32_JaffaCakes118
-
Size
105KB
-
MD5
14728b08fa8f6211901657ee4b894a32
-
SHA1
c3573a37071522c19e1f271b47065acfbaff811d
-
SHA256
24bf601bda2863cf37ec2b79355766dfe5b3425a8c21627cf3d4bc21a1e7035e
-
SHA512
15d45aee8202da65b08f5b7b6c157cee66b6179f0a6c37b3d26a70cc3a8847c8e2966c312a65eb3151d4be7851de8b70f32e6f7ccc2b299f09847d13311f2586
-
SSDEEP
1536:wikW3eGDy4AUe9QH2q2m35J2X8aykTP6KCPXvmakLGycFpkUdvHAO8a5dbe6Es+x:wik3GD52Eb2FtCfTycFxYy5d8sWn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14728b08fa8f6211901657ee4b894a32_JaffaCakes118
Files
-
14728b08fa8f6211901657ee4b894a32_JaffaCakes118.exe windows:4 windows x86 arch:x86
d3206a0a95bb0ecb850f78de5976d9df
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
HttpAddRequestHeadersW
InternetSetOptionW
InternetQueryOptionW
InternetCloseHandle
InternetOpenW
InternetWriteFile
InternetReadFile
HttpSendRequestExW
HttpSendRequestW
HttpOpenRequestA
InternetConnectW
kernel32
SetEndOfFile
GetVolumeInformationW
GetFullPathNameW
lstrcmpiW
LocalAlloc
LocalFree
TlsAlloc
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
ResumeThread
GetCurrentThreadId
GetModuleHandleW
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
LoadLibraryA
GetModuleHandleA
GetProcessVersion
GlobalFlags
GetCurrentDirectoryW
RtlUnwind
ExitThread
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapAlloc
HeapFree
GetTimeZoneInformation
RaiseException
HeapSize
HeapReAlloc
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CreateFileA
GetCPInfo
GetACP
GetOEMCP
GetDriveTypeA
CompareStringA
CompareStringW
SetEnvironmentVariableA
FlushFileBuffers
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateFileW
lstrcpynW
GetLastError
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileW
FindFirstFileW
SetLastError
FindClose
GetModuleFileNameW
CreateThread
lstrcmpW
GetStdHandle
SetStdHandle
DuplicateHandle
GetEnvironmentVariableW
WaitForSingleObject
WriteFile
CreateEventW
CreatePipe
PeekNamedPipe
ReadFile
ExpandEnvironmentStringsW
MultiByteToWideChar
GetStartupInfoW
CreateProcessW
GetCurrentProcessId
CreateDirectoryA
DeleteFileW
GetLogicalDriveStringsW
GetDriveTypeW
GetDiskFreeSpaceExW
TerminateProcess
CreateToolhelp32Snapshot
Process32FirstW
GetCurrentProcess
Process32NextW
OpenProcess
LoadLibraryW
GetProcAddress
FreeLibrary
CloseHandle
GetVersion
GetVersionExW
lstrlenW
GetSystemInfo
GlobalMemoryStatus
GetComputerNameW
lstrcpyW
lstrcatW
Sleep
GetTickCount
user32
RegisterClassW
GetClassInfoW
WinHelpW
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageW
SetWindowTextW
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameW
PtInRect
ClientToScreen
DestroyMenu
TabbedTextOutW
GrayStringW
GetMenuItemID
GetDlgItem
GetWindowTextW
GetDlgCtrlID
SetPropW
GetMenu
CallWindowProcW
RemovePropW
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongW
SetWindowPos
RegisterWindowMessageW
SystemParametersInfoW
IsIconic
GetWindowPlacement
GetWindowRect
GetMenuCheckMarkDimensions
LoadBitmapW
GetMenuState
ModifyMenuW
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
PeekMessageW
SetWindowsHookExW
UnhookWindowsHookEx
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongW
SendMessageW
MessageBoxW
EnableWindow
GetSystemMetrics
CharUpperW
EndDialog
DefWindowProcW
DestroyWindow
DialogBoxParamW
BeginPaint
GetClientRect
DrawTextW
EndPaint
CreateWindowExW
ShowWindow
UpdateWindow
LoadIconW
LoadCursorW
RegisterClassExW
LoadStringW
LoadAcceleratorsW
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
wvsprintfA
wsprintfA
wsprintfW
GetMenuItemCount
GetPropW
GetSubMenu
PostQuitMessage
gdi32
SaveDC
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetDeviceCaps
DeleteDC
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
GetObjectW
SetBkColor
SetTextColor
DeleteObject
GetClipBox
CreateBitmap
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegCloseKey
GetSidSubAuthority
RegQueryValueExW
RegOpenKeyExW
GetUserNameW
LookupAccountNameW
GetSidIdentifierAuthority
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
GetSidSubAuthorityCount
comctl32
ord17
ole32
CoUninitialize
CoInitialize
netapi32
NetUserGetLocalGroups
NetApiBufferFree
Sections
.text Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ