Static task
static1
Behavioral task
behavioral1
Sample
1abae8bece6b2aa93173df4b08b65ada_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1abae8bece6b2aa93173df4b08b65ada_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1abae8bece6b2aa93173df4b08b65ada_JaffaCakes118
-
Size
836KB
-
MD5
1abae8bece6b2aa93173df4b08b65ada
-
SHA1
32648588e039197492186bd66b98ba57a158a29b
-
SHA256
a0b4baff4a545b01f9e18d1aa963cea21d29b4fe10657d2457b6b9afdefd9165
-
SHA512
b5efe72173678fdfa8dc97cce3298c7e02c847a6a9751bcbf7274fcb3c83840ccd31252dc352cfdc3c52a6e16fe00a76f83f6dc9942d5e3e2148c276e0086e44
-
SSDEEP
12288:QLGBy1N/vJy58NFwPWKzgnF0O7e2zE2lBFr5zhQ+Op:QLey1N/hFkkFDeSVvO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1abae8bece6b2aa93173df4b08b65ada_JaffaCakes118
Files
-
1abae8bece6b2aa93173df4b08b65ada_JaffaCakes118.exe windows:4 windows x64 arch:x64
31d19af1a4252e230b129decc53a4b69
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
setupapi
SetupDiClassGuidsFromNameA
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiOpenDevRegKey
SetupDiDestroyDeviceInfoList
winmm
timeKillEvent
timeEndPeriod
timeBeginPeriod
timeSetEvent
timeGetDevCaps
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
lstrcmpA
FindResourceExA
GetProcessVersion
GlobalFlags
LocalAlloc
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetCPInfo
GetOEMCP
GetFileAttributesA
GetFileSize
GetFileTime
SetFileAttributesA
SetErrorMode
WritePrivateProfileStringA
FileTimeToSystemTime
FileTimeToLocalFileTime
VirtualAlloc
GetSystemInfo
MulDiv
RtlUnwindEx
HeapFree
HeapAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
RtlPcToFileHeader
ExitThread
SetStdHandle
GetFileType
GetACP
ExitProcess
HeapSize
HeapReAlloc
HeapSetInformation
HeapCreate
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
ReleaseMutex
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
lstrcpyA
WriteFile
DuplicateHandle
GetThreadLocale
DeleteFileA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
SuspendThread
ResumeThread
SetThreadPriority
SetLastError
FreeResource
GetVersion
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
VirtualProtect
MultiByteToWideChar
WideCharToMultiByte
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
OpenMutexA
CreateMutexA
CreateToolhelp32Snapshot
Module32First
Module32Next
Process32First
Process32Next
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
IsBadWritePtr
IsBadStringPtrA
lstrlenA
CreatePipe
GetExitCodeProcess
lstrcpynA
GetVersionExA
LoadLibraryA
GetProcAddress
FreeLibrary
GetCurrentProcess
GetCurrentThread
SetPriorityClass
Sleep
GetModuleFileNameA
CopyFileA
CreateFileA
CreateProcessA
GetWindowsDirectoryA
GetModuleHandleA
FindResourceA
LoadResource
LockResource
CreateThread
GlobalMemoryStatus
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
WaitForMultipleObjects
DeviceIoControl
GetLastError
ResetEvent
SetEvent
WaitForSingleObject
CloseHandle
CreateEventA
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcessId
FormatMessageA
LocalFree
GetLocaleInfoA
VirtualQuery
user32
CharNextA
SetRect
CopyAcceleratorTableA
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
PostThreadMessageA
GetDesktopWindow
GetClassNameA
GetSysColorBrush
SetWindowContextHelpId
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
CharUpperA
GetMessageA
TranslateMessage
ValidateRect
GetCursorPos
CreateDialogIndirectParamA
EndDialog
SetMenuItemBitmaps
GetNextDlgTabItem
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
MoveWindow
SetWindowTextA
IsDialogMessageA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
DispatchMessageA
IsChild
GetWindowLongPtrA
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
SetWindowLongPtrA
GetTopWindow
GetKeyState
PeekMessageA
GetLastActivePopup
IsWindowVisible
MapWindowPoints
GetSysColor
GetClientRect
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
ScreenToClient
GetClassInfoA
RegisterClassA
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
OffsetRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
CopyRect
GetWindow
MapDialogRect
SetWindowPos
ShowWindow
GetCapture
GetActiveWindow
SetActiveWindow
GetAsyncKeyState
GetFocus
SetFocus
DestroyMenu
WinHelpA
PtInRect
GetWindowRect
GetWindowLongA
GetParent
GetDlgItem
IsWindowEnabled
GetForegroundWindow
UpdateWindow
RegisterWindowMessageA
LoadIconA
MessageBoxA
ExitWindowsEx
DestroyIcon
FindWindowA
SendNotifyMessageA
GetCursor
LoadCursorA
SetCursor
SetForegroundWindow
LoadStringA
SendMessageA
KillTimer
SetTimer
wsprintfA
CreateDialogParamA
PostMessageA
DestroyWindow
PostQuitMessage
IsWindow
EnableWindow
AdjustWindowRectEx
UnregisterClassA
gdi32
EnumFontFamiliesExA
GetMapMode
DPtoLP
GetDeviceCaps
GetTextColor
LPtoDP
GetStockObject
SelectObject
DeleteDC
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetMapMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetBkColor
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetViewportOrgEx
comdlg32
GetOpenFileNameA
GetFileTitleA
GetSaveFileNameA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
RegSetValueExA
RegQueryInfoKeyA
InitiateSystemShutdownA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
InitializeSecurityDescriptor
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyA
RegEnumValueA
shell32
Shell_NotifyIconA
comctl32
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
ord17
oledlg
ord8
ole32
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
CoBuildVersion
CoCreateInstance
CoUninitialize
CoInitializeEx
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CoGetClassObject
CoTaskMemAlloc
oleaut32
VariantCopy
VariantChangeType
SysFreeString
SysAllocString
VariantTimeToSystemTime
VariantClear
OleCreateFontIndirect
SysAllocStringLen
SysAllocStringByteLen
SysStringLen
Sections
.text Size: 400KB - Virtual size: 400KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 189KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 202KB - Virtual size: 215KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE