Static task
static1
Behavioral task
behavioral1
Sample
1a9307dec44d77058eba5ec7d260d089_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1a9307dec44d77058eba5ec7d260d089_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
1a9307dec44d77058eba5ec7d260d089_JaffaCakes118
-
Size
385KB
-
MD5
1a9307dec44d77058eba5ec7d260d089
-
SHA1
125de1aaa119be1a3bba44c07819d61630603d44
-
SHA256
1c50539f5c1490e66b8dd1395d10e21ada53830393333cc0b61e89374ef8c22e
-
SHA512
156dba9fee1fc11c29c0f9d0bdc9fa881dd3cd7317a103bd1e0174a86a02cb06735f56316a312cec140ade834abcab8b9639839c5f41451e791d717383931150
-
SSDEEP
6144:6D3/o3+GQ9x/Vwh3AzrfCzabFno9zNMOaJZUhKuz7aSPe68o7pLVlEo11peidQmc:6bLL/V43AXfCebFnwRhTZWQf6BidQa4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1a9307dec44d77058eba5ec7d260d089_JaffaCakes118
Files
-
1a9307dec44d77058eba5ec7d260d089_JaffaCakes118.exe windows:5 windows x86 arch:x86
95454c5dbf67d28635883146ac9bd076
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsGetValue
VirtualAlloc
GetCurrentProcess
FreeLibrary
GetProcAddress
LoadLibraryA
HeapFree
HeapCreate
HeapCompact
HeapReAlloc
HeapAlloc
WaitForSingleObject
GetFileSize
ReadFile
SetEvent
SetEndOfFile
DeviceIoControl
GetFileAttributesW
DeleteFileW
GlobalMemoryStatus
CreateEventA
GetSystemDirectoryA
LeaveCriticalSection
EnterCriticalSection
GetVersion
DeleteCriticalSection
CreateThread
InitializeCriticalSection
CreateEventW
FindClose
FindFirstFileW
MoveFileW
RemoveDirectoryW
GetDiskFreeSpaceW
GetModuleFileNameW
GetFileTime
GetCurrentProcessId
ExitProcess
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryW
SetLastError
GetVolumeInformationA
CopyFileW
InterlockedExchange
HeapValidate
HeapWalk
GetTimeFormatA
GetDateFormatA
FileTimeToSystemTime
FileTimeToLocalFileTime
LocalFree
LocalAlloc
GetModuleHandleA
MoveFileExW
CreateFileW
WriteFile
SetFilePointer
GetLocalTime
GetSystemTime
QueryPerformanceFrequency
QueryPerformanceCounter
GetVolumeInformationW
GetWindowsDirectoryW
TlsSetValue
GetLocaleInfoW
FindNextFileW
FindFirstChangeNotificationW
FindCloseChangeNotification
FindNextChangeNotification
FreeResource
GlobalAlloc
SizeofResource
LockResource
LoadResource
FindResourceA
MulDiv
GlobalFree
FlushInstructionCache
VirtualProtect
SetFileAttributesW
IsBadReadPtr
GetVersionExA
CreateFileA
GetModuleFileNameA
CreateProcessW
DuplicateHandle
SetErrorMode
SetUnhandledExceptionFilter
WinExec
GetEnvironmentVariableW
GetShortPathNameW
OpenMutexA
CreateMutexA
GetExitCodeProcess
PeekNamedPipe
CreatePipe
TerminateProcess
OpenProcess
GetVersionExW
GetCurrentThread
ReleaseMutex
CreateDirectoryA
CopyFileA
DeleteFileA
FindFirstChangeNotificationA
GetFileAttributesA
GetTempPathA
GetTempFileNameA
MoveFileA
RemoveDirectoryA
FindFirstFileA
FindNextFileA
GetShortPathNameA
GetEnvironmentVariableA
CreateProcessA
GetDiskFreeSpaceA
SetFileAttributesA
FormatMessageW
FormatMessageA
GetCPInfo
GlobalUnlock
GlobalLock
SetSystemPowerState
GetSystemTimeAsFileTime
GetProcessHeap
TlsAlloc
GetCommandLineW
GetStartupInfoA
GetTempPathW
GetTempFileNameW
CloseHandle
GetLastError
GetTickCount
GetCurrentThreadId
Sleep
CreateDirectoryW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
advapi32
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyExA
RegCreateKeyExW
RegOpenKeyExW
GetFileSecurityW
ImpersonateSelf
OpenThreadToken
MapGenericMask
AccessCheck
RevertToSelf
RegDeleteKeyW
RegQueryInfoKeyW
RegDeleteValueW
RegSetValueExW
RegQueryValueExW
RegCloseKey
AllocateAndInitializeSid
FreeSid
RegQueryValueExA
comctl32
ImageList_GetImageCount
ord6
ImageList_LoadImageA
ImageList_AddMasked
ImageList_LoadImageW
ImageList_GetIcon
ImageList_ReplaceIcon
ImageList_Remove
ord17
ImageList_Draw
ImageList_Destroy
ImageList_Create
ImageList_Add
comdlg32
GetSaveFileNameW
GetOpenFileNameW
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
gdi32
GetDIBits
GetStockObject
GetCurrentObject
CreateBitmap
CreateDIBSection
StretchBlt
GetDeviceCaps
GetObjectW
CreateFontIndirectA
CreateSolidBrush
CreatePen
ExtTextOutW
GetTextMetricsA
TextOutW
SetBkMode
Polyline
GetObjectA
MoveToEx
LineTo
CreateFontA
SetTextColor
SetBkColor
GetTextExtentPoint32A
BitBlt
CreateRectRgn
RectInRegion
CombineRgn
OffsetRgn
SelectClipRgn
SetWindowOrgEx
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
SetTextAlign
DeleteObject
msvcrt
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_msize
_errno
_onexit
__dllonexit
fclose
fopen
fprintf
fflush
_wtol
_waccess
_CIsqrt
_CIsin
_CIcos
_getpid
time
srand
realloc
free
wcsncmp
localtime
strstr
_wcsdup
tolower
_wcsnicmp
_except_handler3
_setjmp3
longjmp
strncmp
isdigit
strtok
isprint
_snprintf
isspace
strtol
_purecall
strtoul
strncpy
_CIpow
malloc
rand
ceil
_stricmp
_strnicmp
strchr
memchr
strrchr
atoi
_wtoi
wcschr
wcsrchr
_wcsicmp
memset
_atoi64
memmove
memcpy
_controlfp
shell32
SHGetMalloc
ShellExecuteA
SHChangeNotify
DragQueryFileW
DragQueryFileA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetFileInfoA
Shell_NotifyIconA
SHFileOperationA
DragFinish
ShellExecuteW
user32
MapVirtualKeyA
CreateMenu
SetMenuItemInfoA
GetMenuItemInfoA
IsWindow
CallWindowProcW
SetTimer
KillTimer
IsIconic
FindWindowW
PostQuitMessage
LoadImageW
DestroyIcon
LoadBitmapA
DrawIconEx
GetIconInfo
SetWindowTextW
SetDlgItemTextW
DrawEdge
SendMessageA
SendMessageTimeoutA
SetWindowTextA
GetClassInfoExW
FindWindowA
CreateWindowExA
DrawTextA
GetKeyNameTextA
GetWindowTextA
GetWindowTextLengthA
RegisterClassExA
GetClassInfoExA
AppendMenuA
CallWindowProcA
GetMessageA
GetWindowLongA
IsDialogMessageA
PostMessageA
SetWindowLongA
SetWindowsHookExA
DefWindowProcA
DispatchMessageA
CreateDialogIndirectParamA
DialogBoxIndirectParamA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
DrawIcon
SetForegroundWindow
GetClipboardData
IsClipboardFormatAvailable
MapDialogRect
SetCapture
ReleaseCapture
IsWindowEnabled
CheckMenuRadioItem
CheckMenuItem
RegisterHotKey
UnregisterHotKey
ExitWindowsEx
RegisterWindowMessageA
InflateRect
ClientToScreen
InsertMenuItemW
IntersectRect
SetCursor
SetParent
GetDoubleClickTime
FrameRect
GetTopWindow
SetDlgItemInt
GetDlgItemInt
ShowScrollBar
GetScrollRange
GetKeyNameTextW
GetPropA
LoadCursorA
RegisterClassExW
ScreenToClient
SetWindowsHookExW
GetClassNameA
BeginDeferWindowPos
DeferWindowPos
EndDeferWindowPos
CheckRadioButton
EndDialog
SendDlgItemMessageW
OffsetRect
DestroyWindow
LoadImageA
LoadIconA
GetMessageW
TranslateMessage
DispatchMessageW
WindowFromPoint
EnumWindows
IsDialogMessageW
CallNextHookEx
GetClassNameW
DefWindowProcW
GetAsyncKeyState
GetWindowLongW
GetMessagePos
GetMessageTime
GetScrollInfo
ScrollWindow
GetDlgCtrlID
GetSysColor
DrawTextW
CreateWindowExW
LockWindowUpdate
ValidateRect
InvalidateRect
BeginPaint
PostMessageW
GetDesktopWindow
GetWindowThreadProcessId
GetWindowRect
GetSystemMetrics
GetForegroundWindow
GetClientRect
SendMessageW
MapWindowPoints
DestroyMenu
TrackPopupMenu
GetCursorPos
AppendMenuW
CreatePopupMenu
DrawFrameControl
FillRect
GetSysColorBrush
GetActiveWindow
ReleaseDC
GetDC
UpdateWindow
GetFocus
SetFocus
EnumChildWindows
SetWindowPos
ShowWindow
IsDlgButtonChecked
CheckDlgButton
EnableWindow
GetDlgItem
SetWindowLongW
GetScrollPos
EndPaint
GetWindow
GetParent
LoadIconW
MessageBoxW
SetPropA
GetSystemMenu
GetMenuItemCount
GetMenuItemID
RemoveMenu
UnhookWindowsHookEx
CreateDialogIndirectParamW
DialogBoxIndirectParamW
SystemParametersInfoW
GetWindowTextW
GetWindowTextLengthW
SetScrollInfo
ws2_32
ntohl
WSAGetLastError
inet_addr
gethostbyname
inet_ntoa
WSAAddressToStringA
WSAWaitForMultipleEvents
WSAEnumNetworkEvents
listen
accept
WSAEventSelect
getsockname
getpeername
WSASend
bind
WSARecv
ioctlsocket
connect
select
__WSAFDIsSet
recv
sendto
recvfrom
setsockopt
socket
WSAIoctl
closesocket
gethostname
WSAStringToAddressA
WSAStartup
WSACleanup
WSASetLastError
getservbyport
ntohs
gethostbyaddr
htons
getservbyname
htonl
Sections
.text Size: - Virtual size: 427KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.5a611q0 Size: - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.5a611q1 Size: 363KB - Virtual size: 362KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE