Static task
static1
Behavioral task
behavioral1
Sample
1775c26866b07e9267d43451d128625a_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1775c26866b07e9267d43451d128625a_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1775c26866b07e9267d43451d128625a_JaffaCakes118
-
Size
267KB
-
MD5
1775c26866b07e9267d43451d128625a
-
SHA1
a8fe68622942af5cc9cc57a86b4eb5ba8d8f4581
-
SHA256
cfd5ddc4779f434e59069948a6ce2a2b8fd820f012738cbfb510a1eeecf07ca9
-
SHA512
9d2630ac35d26540983c876bb2191456796f33cc1bd4b42077ff5bfdda41a572be597e875fe814d08644b171ee4cb2c7195536b99c633d265aa0038de198c2fe
-
SSDEEP
6144:+3GEeC/U62M3znCmy0tjbNf7/ePV88igE5skr0o:QG3762SC07/eGRgA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1775c26866b07e9267d43451d128625a_JaffaCakes118
Files
-
1775c26866b07e9267d43451d128625a_JaffaCakes118.exe windows:5 windows x86 arch:x86
5f1dfbc09d2aeb475ce084f415e9b451
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
ioctlsocket
inet_addr
gethostbyname
htons
socket
WSAStartup
connect
send
WSACleanup
closesocket
recv
advapi32
RegOpenKeyA
RegSetValueExA
RegCloseKey
kernel32
FindClose
FindFirstFileA
GetFullPathNameA
CreateFileA
GlobalFlags
GetLocaleInfoA
GetCPInfo
GetOEMCP
FileTimeToLocalFileTime
GetCurrentDirectoryA
RtlUnwind
HeapFree
GetDriveTypeA
ExitProcess
HeapAlloc
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
RaiseException
GetStartupInfoA
VirtualAlloc
HeapReAlloc
HeapSize
GetConsoleCP
GetConsoleMode
HeapCreate
VirtualFree
GetStdHandle
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetACP
IsValidCodePage
GetTimeZoneInformation
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
lstrcmpW
GetVersionExA
FileTimeToSystemTime
lstrcmpA
GlobalGetAtomNameA
InterlockedIncrement
GetModuleHandleW
CompareStringA
GetCurrentThreadId
FormatMessageA
MultiByteToWideChar
lstrlenA
GetCurrentProcessId
FreeLibrary
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
InterlockedDecrement
GetModuleHandleA
GetProcAddress
TlsFree
GlobalFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalAlloc
GlobalHandle
GlobalUnlock
GlobalReAlloc
GlobalLock
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalFree
LocalAlloc
GetLastError
SetLastError
CreateToolhelp32Snapshot
Process32First
OpenProcess
TerminateProcess
CloseHandle
Process32Next
GetTempPathA
GetTickCount
GetCommandLineA
GetModuleFileNameA
SetFileAttributesA
CopyFileA
GetEnvironmentVariableA
Sleep
CreateProcessA
IsDebuggerPresent
CreateDirectoryA
user32
PostQuitMessage
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
ClientToScreen
SetWindowTextA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClientRect
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
SetPropA
CheckMenuItem
GetWindowTextA
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
MessageBoxA
gdi32
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
RectVisible
GetDeviceCaps
PtVisible
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
DeleteObject
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
TextOutA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
oleaut32
VariantInit
VariantClear
VariantChangeType
oleacc
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 228KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE