Static task
static1
Behavioral task
behavioral1
Sample
167f82b6c69ac84024a88618141652ff_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
167f82b6c69ac84024a88618141652ff_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
167f82b6c69ac84024a88618141652ff_JaffaCakes118
-
Size
919KB
-
MD5
167f82b6c69ac84024a88618141652ff
-
SHA1
1ef8b10fabf6dab4b4fb5a196a223ef6348b0df7
-
SHA256
644969dfddf2090daef6d6f9827377663f7d721a82d6ecffaf32b58ca315ba51
-
SHA512
42e013948f28e6606c33174d454ed46ef2429be687a094b9effb8a0dd394b9763e581bd75e235037fdd4abab3680280f1285863af9ba8e85945f7582f8c756b9
-
SSDEEP
24576:TAlPDRpPs44kQFuH8dYKcuHZqV91EgmILc:T+ReD1qV91EHILc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 167f82b6c69ac84024a88618141652ff_JaffaCakes118
Files
-
167f82b6c69ac84024a88618141652ff_JaffaCakes118.exe windows:5 windows x86 arch:x86
f4d5e14e0b74226dded3bace697e63c7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetOpenW
InternetQueryOptionW
InternetOpenUrlW
InternetReadFile
InternetGetConnectedState
InternetCloseHandle
HttpQueryInfoW
comctl32
ord17
kernel32
LeaveCriticalSection
GetExitCodeProcess
MulDiv
GetModuleFileNameW
lstrcmpW
GlobalUnlock
FlushInstructionCache
RaiseException
SetLastError
EnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
FindResourceW
LoadResource
WaitForSingleObject
WriteFile
SizeofResource
CreateFileW
GetCurrentDirectoryW
LockResource
SetCurrentDirectoryW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GetProcAddress
lstrcmpiW
lstrcpynW
CreateDirectoryW
TerminateThread
WritePrivateProfileStringW
CreateThread
GetTempPathW
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
DeleteFileW
FreeResource
LoadLibraryW
FlushFileBuffers
CreateFileA
GetLocaleInfoA
GetVersionExW
GetStringTypeA
LCMapStringW
LCMapStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSectionAndSpinCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
SetFilePointer
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
HeapSize
GetModuleFileNameA
GetStdHandle
ExitProcess
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
GetStartupInfoW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LoadLibraryA
InterlockedExchange
LocalAlloc
Sleep
WideCharToMultiByte
InitializeCriticalSection
GetTickCount
GlobalLock
InterlockedDecrement
MoveFileExW
InterlockedIncrement
lstrlenA
CreateMutexW
CloseHandle
VirtualQuery
GlobalFree
GetLastError
lstrlenW
MultiByteToWideChar
GlobalAlloc
OpenProcess
HeapFree
GetCurrentProcess
HeapAlloc
GetVolumeInformationW
GetProcessHeap
GetComputerNameW
InterlockedCompareExchange
IsProcessorFeaturePresent
GetModuleHandleA
GetStringTypeW
user32
CreateWindowExW
MessageBoxW
ReleaseCapture
SetWindowTextW
CallWindowProcW
DefWindowProcW
GetWindow
MoveWindow
GetWindowThreadProcessId
GetShellWindow
UnregisterClassA
SetLayeredWindowAttributes
GetCursorPos
SystemParametersInfoW
LoadIconW
TranslateMessage
PostQuitMessage
GetMessageW
GetWindowRect
UpdateLayeredWindow
AnimateWindow
UpdateWindow
EnumWindows
PostMessageW
SendMessageW
IsWindow
SetWindowPos
DispatchMessageW
LockWindowUpdate
CheckRadioButton
ShowWindow
TrackMouseEvent
DrawFrameControl
SetCursor
GetWindowDC
EnableWindow
GetDlgCtrlID
EndPaint
ClientToScreen
DestroyWindow
GetWindowTextLengthW
DestroyAcceleratorTable
ScreenToClient
CharNextW
RegisterWindowMessageW
FillRect
IsChild
SetCapture
UnregisterClassW
SetForegroundWindow
GetFocus
GetParent
InvalidateRgn
LoadCursorW
FindWindowW
GetClientRect
CreateAcceleratorTableW
SetFocus
BeginPaint
GetClassInfoExW
GetDC
RegisterClassExW
InvalidateRect
GetWindowLongW
GetWindowTextW
GetClassNameW
ReleaseDC
GetDlgItem
SetWindowLongW
RedrawWindow
GetDesktopWindow
GetSysColor
gdi32
CreateCompatibleBitmap
CreateCompatibleDC
DeleteObject
GetDeviceCaps
GetStockObject
BitBlt
SetBkMode
SetBkColor
SetTextColor
CreateFontW
DeleteDC
GetObjectW
SelectObject
CreateSolidBrush
advapi32
GetTokenInformation
GetUserNameW
OpenProcessToken
RegCloseKey
RegQueryValueExW
RegCreateKeyW
RegSetValueExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegQueryInfoKeyW
RegCreateKeyExW
RegOpenKeyW
RegOpenKeyExW
LookupAccountSidW
shell32
ord680
ShellExecuteW
SHGetFolderPathW
ShellExecuteExW
ole32
CreateStreamOnHGlobal
StringFromGUID2
CLSIDFromProgID
OleLockRunning
OleInitialize
OleUninitialize
CoGetClassObject
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CLSIDFromString
oleaut32
SysAllocString
SysStringLen
VariantClear
LoadTypeLi
VariantInit
SysAllocStringLen
OleCreateFontIndirect
SysFreeString
LoadRegTypeLi
VarUI4FromStr
shlwapi
wnsprintfW
StrCpyNW
StrCatW
StrStrIW
StrCmpW
PathFileExistsW
StrTrimW
StrCpyW
StrStrW
StrRChrW
AssocQueryStringW
StrNCatW
StrCmpIW
UrlEscapeW
wintrust
WinVerifyTrust
Sections
.text Size: 145KB - Virtual size: 145KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ