Static task
static1
Behavioral task
behavioral1
Sample
157432407ab5638b26757a42e2862871_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
157432407ab5638b26757a42e2862871_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
157432407ab5638b26757a42e2862871_JaffaCakes118
-
Size
224KB
-
MD5
157432407ab5638b26757a42e2862871
-
SHA1
9eaf32830de21e02a72280c851936ca590278710
-
SHA256
8f5d8901724ddc4f5f9374155dadc799527e7d16823481d938cb6ae3de93c88d
-
SHA512
678117a2e4039ea118259c9527ba5c940fd1e6ce2968ff035349956cb55a9660edd04aa9e6da1ee1f93845613c80f95dfbf1ad1d656a64b8c51e6b4f0169b239
-
SSDEEP
3072:27FHV9n12VAaN/mo/RIzFfevWoRhVxk+yfzDo1yp:2ZHVF1YszlevfVxk+q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 157432407ab5638b26757a42e2862871_JaffaCakes118
Files
-
157432407ab5638b26757a42e2862871_JaffaCakes118.exe windows:4 windows x86 arch:x86
640a3beb91bdc341995cc546eb32d5a2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
LocalFree
InitializeCriticalSection
TlsAlloc
DeleteCriticalSection
GlobalFree
GlobalUnlock
GlobalHandle
LeaveCriticalSection
GlobalLock
GlobalReAlloc
GlobalAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
InterlockedDecrement
lstrlenW
GetVersion
InterlockedIncrement
GetCurrentThreadId
GetModuleHandleW
lstrcpyW
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
lstrcatW
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcessVersion
lstrcpynW
lstrcmpW
GlobalFlags
GetCurrentProcess
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
HeapAlloc
HeapFree
RaiseException
RtlUnwind
HeapSize
HeapReAlloc
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetCPInfo
GetACP
GetOEMCP
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
GetStringTypeW
SetLastError
FindFirstFileW
FindNextFileW
FindClose
SystemTimeToFileTime
GetSystemDirectoryW
GetSystemTime
GetFileTime
SetFileTime
CreateDirectoryW
SetFilePointer
GetLogicalDriveStringsW
GetFileSize
MultiByteToWideChar
GetDriveTypeW
GetFileAttributesW
LoadLibraryW
GetProcAddress
GetCurrentDirectoryW
GetWindowsDirectoryW
Sleep
SetCurrentDirectoryW
CreateFileW
GetModuleFileNameW
GetLastError
CloseHandle
WriteFile
CopyFileW
SetFileAttributesW
DeleteFileW
GetWindowsDirectoryA
WinExec
FindResourceW
SizeofResource
LoadResource
LockResource
WideCharToMultiByte
GetStartupInfoW
CreateProcessW
CreateMutexW
ReleaseMutex
GetModuleFileNameA
GetFileAttributesA
lstrcmpiW
CreateThread
user32
GetClassInfoW
WinHelpW
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageW
SetWindowTextW
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameW
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutW
DrawTextW
GrayStringW
RegisterClassW
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextW
GetDlgCtrlID
DestroyWindow
SetPropW
GetPropW
CallWindowProcW
RemovePropW
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongW
SetWindowPos
RegisterWindowMessageW
SystemParametersInfoW
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapW
GetMenuState
ModifyMenuW
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
PeekMessageW
SetWindowsHookExW
LoadStringW
UnhookWindowsHookEx
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongW
MessageBoxW
EnableWindow
GetMenu
DispatchMessageW
TranslateMessage
GetMessageW
RegisterClassExW
LoadCursorW
OpenDesktopW
CloseDesktop
wsprintfW
DefWindowProcW
CreateWindowExW
LoadIconW
GetDesktopWindow
UpdateWindow
SendMessageW
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHGetPathFromIDListW
ShellExecuteA
ShellExecuteW
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoInitialize
CoUninitialize
CoTaskMemFree
CoCreateInstance
comctl32
ord17
shlwapi
PathFileExistsW
gdi32
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetStockObject
SelectObject
RestoreDC
GetClipBox
SetTextColor
SetBkColor
GetObjectW
GetDeviceCaps
DeleteObject
DeleteDC
CreateBitmap
SaveDC
winspool.drv
ClosePrinter
OpenPrinterW
DocumentPropertiesW
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE