Static task
static1
Behavioral task
behavioral1
Sample
14eb5f731f4433c61eb4e216d43f550e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
14eb5f731f4433c61eb4e216d43f550e_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
14eb5f731f4433c61eb4e216d43f550e_JaffaCakes118
-
Size
268KB
-
MD5
14eb5f731f4433c61eb4e216d43f550e
-
SHA1
8c8d88d944dcdd781af4af7e40ac9e8f4e2deba4
-
SHA256
7fb5f25d1d219f392d89b2f1025e096b6a8f7493578fc70bb85ba7f95add2a60
-
SHA512
8bd834767bf1ce2d3c8fe3be60668f01ffb3004d8dc33e5dd91ca1f2531719824e3ddb4be13104c8a87c4262fb90a0697ae77e775c0835ce6fd9def55cf58881
-
SSDEEP
6144:eUnwsWXCpg28EYb4xQUZWhG4w3rhu6j+3wQHxpn1r:Jk9EAIQUQIb+hxb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14eb5f731f4433c61eb4e216d43f550e_JaffaCakes118
Files
-
14eb5f731f4433c61eb4e216d43f550e_JaffaCakes118.exe windows:4 windows x86 arch:x86
102327289dee3847524bc4e19bcc65c6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetFolderPathA
SHGetSpecialFolderPathA
shlwapi
PathGetArgsA
PathAppendA
SHGetValueA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFileExistsA
PathIsDirectoryA
iphlpapi
GetAdaptersInfo
kernel32
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
HeapDestroy
HeapCreate
WriteFile
GetStdHandle
SetStdHandle
SetHandleCount
ReadFile
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
InitializeCriticalSection
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
UnhandledExceptionFilter
GetLocaleInfoA
SetEndOfFile
SetEnvironmentVariableA
LocalFree
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
FindClose
FindNextFileA
FindFirstFileA
GlobalGetAtomNameA
LockFile
UnlockFile
GetFileSize
GetThreadLocale
DuplicateHandle
GetFullPathNameA
LocalAlloc
GlobalReAlloc
GlobalHandle
LocalReAlloc
GetFileTime
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalFlags
GetCurrentDirectoryA
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetProcessHeap
GetCommandLineA
RaiseException
GetFileType
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
RtlUnwind
GetModuleHandleA
VirtualAlloc
HeapReAlloc
HeapFree
HeapAlloc
OutputDebugStringA
RemoveDirectoryA
Sleep
CreateMutexA
GetSystemTimeAsFileTime
SystemTimeToFileTime
ExitProcess
GetTempPathA
CopyFileA
SetCurrentDirectoryA
lstrcpyA
SetLastError
GetVolumeInformationA
GetComputerNameA
DeleteFileA
GetFileAttributesA
lstrcmpA
GetVersionExA
GetCurrentProcess
SetPriorityClass
GetModuleFileNameA
GetShortPathNameA
CreateFileA
DeviceIoControl
lstrlenA
lstrcmpiA
CompareStringW
CompareStringA
GetVersion
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
WaitForSingleObject
TerminateProcess
OpenProcess
CloseHandle
FreeLibrary
LoadLibraryA
GetProcAddress
GetStringTypeW
GetDriveTypeA
user32
SetWindowTextA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
PostQuitMessage
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetParent
GetWindowLongA
DestroyMenu
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
SendMessageA
GetKeyState
PeekMessageA
ValidateRect
GetSystemMetrics
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ClientToScreen
GetMenu
UnregisterClassA
PostMessageA
FindWindowExA
GetWindowThreadProcessId
EnumWindows
CharUpperA
SendMessageTimeoutA
RegisterWindowMessageA
GetWindowTextA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
MessageBoxA
FindWindowA
GetDesktopWindow
GetWindow
SetWindowPos
gdi32
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
RestoreDC
SaveDC
DeleteObject
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
SetViewportOrgEx
SelectObject
ExtTextOutA
GetDeviceCaps
TextOutA
RectVisible
PtVisible
SetMapMode
Escape
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegDeleteValueA
RegQueryValueExA
RegSetValueExA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
ole32
StringFromIID
CoGetMalloc
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 188KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ