Static task
static1
Behavioral task
behavioral1
Sample
178452996b9bab8bad39e5664f435bbe_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
178452996b9bab8bad39e5664f435bbe_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
178452996b9bab8bad39e5664f435bbe_JaffaCakes118
-
Size
1.0MB
-
MD5
178452996b9bab8bad39e5664f435bbe
-
SHA1
abf7fbb1784743b01738cb2d79e51a3749380184
-
SHA256
49976f32a18041bba7ceca29d586b1cd172a26a2ba20ad660115062431d9b404
-
SHA512
3ff5669cce8d3129b3904b4d5829fd0d5af557f7b5b47cba33bafad818f4366b66a2b0f10e4767f92e9edffe8fa32bd582b23339bfdf9233abbe326fad514379
-
SSDEEP
12288:gDlX+AnHc8qiG7eUM1LWy/DK9RoocHWJzVP8HFMN6vr7SH3u3fLPOtyV+1t10k:gDgAnjTYtVUgSo3UDWtCq1D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 178452996b9bab8bad39e5664f435bbe_JaffaCakes118
Files
-
178452996b9bab8bad39e5664f435bbe_JaffaCakes118.exe windows:4 windows x86 arch:x86
8f3eb5a3fa15cbf238cf3724002bc755
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
timeGetTime
kernel32
HeapFree
HeapReAlloc
VirtualAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
ExitProcess
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetFileType
GetACP
VirtualFree
HeapDestroy
HeapCreate
GetConsoleCP
GetConsoleMode
HeapAlloc
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
GetSystemTimeAsFileTime
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleOutputCP
WriteConsoleW
RtlUnwind
SetErrorMode
SetEndOfFile
FlushFileBuffers
WritePrivateProfileStringA
GetThreadLocale
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
GetSystemDirectoryA
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GetCurrentProcessId
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
InterlockedDecrement
GetModuleFileNameW
SetLastError
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemInfo
GetProcessAffinityMask
SetFilePointer
ReadFile
DeleteFileA
GetComputerNameA
DeviceIoControl
CreateMutexA
ReleaseMutex
GetCurrentProcess
GlobalAlloc
GlobalReAlloc
GlobalFree
GlobalSize
lstrcmpiA
CompareStringA
GetVersion
MultiByteToWideChar
InterlockedExchange
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
lstrcatA
lstrlenA
WinExec
lstrcpyA
GetVersionExA
GetTempPathA
GetStdHandle
GetModuleHandleA
GetModuleFileNameA
GetProcAddress
GlobalMemoryStatus
WriteConsoleA
CreateFileA
WriteFile
GetLastError
CreateThread
SetThreadPriority
Sleep
ExitThread
WaitForSingleObject
CloseHandle
GetCurrentDirectoryA
SetCurrentDirectoryA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
FreeEnvironmentStringsA
user32
DestroyMenu
UnregisterClassA
GetSysColorBrush
GetWindowThreadProcessId
PostQuitMessage
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SetDlgItemInt
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetActiveWindow
ShowWindow
IsWindowEnabled
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
GetParent
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindow
UnhookWindowsHookEx
SetWindowsHookExA
EndPaint
BeginPaint
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
wsprintfA
EmptyClipboard
SetClipboardData
CloseClipboard
GetDC
ReleaseDC
SetWindowLongA
LoadCursorA
CopyIcon
SetCursor
GetSysColor
LoadImageA
KillTimer
SetTimer
IsIconic
DrawIcon
OffsetRect
MessageBoxA
GetSystemMetrics
GetWindowDC
EnableWindow
OpenClipboard
GetClientRect
GetWindowRect
SendMessageA
LoadBitmapA
GetDlgItem
CallNextHookEx
gdi32
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
CreateBitmap
GetObjectA
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
GetSystemPaletteEntries
SelectPalette
RealizePalette
GetDIBits
GetDeviceCaps
CreatePalette
CreateFontIndirectA
GetStockObject
CreateFontA
GetTextExtentPoint32A
GetPixel
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RevertToSelf
AccessCheck
IsValidSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
RegSetValueExA
RegCreateKeyExA
RegEnumKeyA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyA
OpenSCManagerA
ControlService
StartServiceA
OpenServiceA
DeleteService
CreateServiceA
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
InitializeSecurityDescriptor
FreeSid
AllocateAndInitializeSid
OpenProcessToken
OpenThreadToken
ImpersonateSelf
shell32
ShellExecuteA
shlwapi
PathFindFileNameA
PathFindExtensionA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
VariantClear
VariantChangeType
VariantInit
SysStringLen
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 500KB - Virtual size: 499KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 380KB - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ