Static task
static1
Behavioral task
behavioral1
Sample
14f7767077ec175260e32d92f486f7ae_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
14f7767077ec175260e32d92f486f7ae_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
14f7767077ec175260e32d92f486f7ae_JaffaCakes118
-
Size
767KB
-
MD5
14f7767077ec175260e32d92f486f7ae
-
SHA1
475883bffb3e6578bb9a1149e2518d28745b6852
-
SHA256
9a3803201d37b9c797d39ec6660a17828b9cad92309f2fef39f2fac8294552ae
-
SHA512
805dec12aa5da5f3636528e52ef4fb191d2310e05449ca4ed891a1bec6c9ffb222e6f95177f217fb7bd91a17159d7984a7bf1cd16b9ab790e89903abe7a00353
-
SSDEEP
12288:jJBSSGhtgXIMDM8VktnvrefYmScDI9GM8p3cruDgz:bSXLtm+vrncDI91SDgz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14f7767077ec175260e32d92f486f7ae_JaffaCakes118
Files
-
14f7767077ec175260e32d92f486f7ae_JaffaCakes118.exe windows:4 windows x86 arch:x86
4c9d5a488d5a1f2c92ba61a38df981ea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
HeapSize
GetTimeZoneInformation
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
GetExitCodeProcess
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetLocaleInfoW
SetStdHandle
GetCommandLineA
GetProfileStringA
GetStartupInfoA
RaiseException
HeapAlloc
HeapFree
RtlUnwind
FileTimeToLocalFileTime
FileTimeToSystemTime
SetErrorMode
WritePrivateProfileStringA
GetOEMCP
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetFileTime
GetFileAttributesA
GetFullPathNameA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
DuplicateHandle
GlobalFlags
GlobalAlloc
GetCurrentThread
lstrcmpA
lstrcpynA
MulDiv
SetLastError
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GlobalLock
GlobalUnlock
GlobalFree
FindFirstFileA
FindNextFileA
FindClose
TerminateProcess
LoadLibraryW
GetModuleHandleA
OpenMutexA
CreateMutexA
WaitForSingleObject
CreateProcessA
ResumeThread
ReleaseMutex
GetPrivateProfileStringA
GetPrivateProfileIntA
SetCurrentDirectoryA
OpenFileMappingA
CreateFileMappingA
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
CreateToolhelp32Snapshot
Process32First
GetCurrentProcessId
Process32Next
GetSystemDirectoryA
DeleteFileA
GetLastError
Sleep
GetACP
GetModuleFileNameA
CreateThread
MultiByteToWideChar
GetTickCount
GetFileSize
ReadFile
ExitProcess
UnmapViewOfFile
MapViewOfFile
LocalFree
GetCurrentProcess
SetPriorityClass
DeviceIoControl
LoadLibraryA
GetProcAddress
FreeLibrary
FindResourceA
SizeofResource
LoadResource
LockResource
GetCPInfo
lstrlenW
lstrlenA
GetVersion
GetVersionExA
CreateFileA
WriteFile
CloseHandle
OutputDebugStringA
InterlockedExchange
GetStdHandle
user32
SetDlgItemTextA
IsDialogMessageA
SetWindowTextA
MoveWindow
ShowWindow
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
GrayStringA
SetRectEmpty
ValidateRect
TranslateMessage
GetMessageA
PostQuitMessage
GetClassNameA
GetDesktopWindow
CharUpperA
LoadCursorA
GetDCEx
LockWindowUpdate
SetParent
PeekMessageA
DispatchMessageA
GetFocus
SetFocus
AdjustWindowRectEx
EqualRect
DeferWindowPos
IsWindowVisible
GetTopWindow
IsChild
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
TrackPopupMenu
GetWindowTextLengthA
GetKeyState
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
IntersectRect
GetWindowPlacement
EndDialog
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindowEnabled
IsIconic
DrawIcon
ExitWindowsEx
FindWindowExA
EnumWindows
EnumChildWindows
GetWindowThreadProcessId
GetWindowTextA
LoadIconA
IsWindow
MessageBoxA
GetDlgItem
LoadBitmapA
SetCapture
ScreenToClient
ReleaseCapture
KillTimer
SetTimer
PtInRect
GetCursorPos
LoadStringA
RemoveMenu
ModifyMenuA
InsertMenuA
GetMenuStringA
GetMenuState
GetMenuItemID
GetMenuItemCount
AppendMenuA
DeleteMenu
CreatePopupMenu
GetDlgCtrlID
EnableWindow
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DefDlgProcA
CharNextA
CreateMenu
DrawEdge
SetRect
GetSysColorBrush
GetSystemMetrics
DrawTextA
DrawIconEx
SystemParametersInfoA
GetMenuItemInfoA
GetWindowLongA
WindowFromPoint
GetParent
GetNextDlgTabItem
GetActiveWindow
InvalidateRect
ClientToScreen
GetClientRect
GetWindowRect
DrawFocusRect
DrawStateA
FrameRect
OffsetRect
InflateRect
GetDlgItemTextA
GetDlgItemInt
UpdateWindow
SendDlgItemMessageA
DefWindowProcA
MapWindowPoints
CopyRect
LoadMenuA
LoadImageA
GetIconInfo
CreateIconIndirect
GetDC
ReleaseDC
GetSysColor
FillRect
GetSubMenu
TrackPopupMenuEx
PostMessageA
SetCursor
DestroyIcon
DestroyCursor
DestroyMenu
IsWindowUnicode
SendMessageA
gdi32
SetWindowExtEx
ScaleWindowExtEx
SelectClipRgn
ExcludeClipRect
IntersectClipRect
MoveToEx
LineTo
CreateRectRgn
GetDeviceCaps
CreatePatternBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetRectRgn
CombineRgn
StretchDIBits
GetCharWidthA
CreateFontA
GetTextMetricsA
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateRectRgnIndirect
GetClipBox
GetTextExtentPoint32A
PatBlt
Ellipse
GetBkMode
CreateFontIndirectA
CreatePen
CreateSolidBrush
GetTextExtentPoint32W
CreateDIBSection
GetObjectA
GetPixel
SetPixel
CreateCompatibleBitmap
CreateBitmap
CreateCompatibleDC
SelectObject
SetBkColor
BitBlt
SetTextColor
DeleteDC
GetStockObject
GetTextExtentPointA
CreateDIBitmap
DeleteObject
comdlg32
GetSaveFileNameA
GetFileTitleA
GetOpenFileNameA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
SetEntriesInAclA
GetSecurityInfo
RegCloseKey
RegQueryValueExA
RegOpenKeyA
StartServiceA
OpenServiceA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
DeleteService
ControlService
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
GetUserNameA
SetSecurityInfo
shell32
ShellExecuteA
Shell_NotifyIconA
ShellExecuteExA
comctl32
ImageList_GetIconSize
ImageList_AddMasked
ImageList_ReplaceIcon
ImageList_GetIcon
ImageList_Draw
ord17
ImageList_Destroy
ImageList_Create
_TrackMouseEvent
winmm
PlaySoundA
gdiplus
GdipGetImageWidth
GdipCloneImage
GdipDisposeImage
GdipLoadImageFromFileICM
GdipGetImageHeight
GdipDrawImageRectI
GdipReleaseDC
GdipDeleteGraphics
GdipCreateFromHDC
GdipAlloc
GdiplusShutdown
GdiplusStartup
GdipLoadImageFromFile
GdipFree
wsock32
WSAStartup
closesocket
shutdown
send
gethostname
recv
__WSAFDIsSet
select
connect
gethostbyname
socket
htons
inet_addr
WSACleanup
wininet
InternetCloseHandle
InternetReadFile
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetCrackUrlA
InternetOpenUrlA
InternetOpenA
Sections
.text Size: 388KB - Virtual size: 386KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.abc Size: 279KB - Virtual size: 279KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE