Static task
static1
Behavioral task
behavioral1
Sample
1c6dc59a3f286c4d903eb91959a32061_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1c6dc59a3f286c4d903eb91959a32061_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1c6dc59a3f286c4d903eb91959a32061_JaffaCakes118
-
Size
919KB
-
MD5
1c6dc59a3f286c4d903eb91959a32061
-
SHA1
5bee7b4024d86611a7fbd48468fb8c8a7aa4dab6
-
SHA256
6f2dd3c6f75e9a52bdcd105e3072773d8d9ffbbf7aad414e3820d0c1467c0903
-
SHA512
6e231eff65ee4f598c7277f187eae2c5c761bf0e81f9ecefa152a190e83af59b436f49768b4d595996f22603677224eea5cc936beb24d27ce0d3856791135d93
-
SSDEEP
24576:1QE7BdI/ETNkg/6NcT+bF5tilvQu9UZk2:1QE7GTDGsF5Uvu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1c6dc59a3f286c4d903eb91959a32061_JaffaCakes118
Files
-
1c6dc59a3f286c4d903eb91959a32061_JaffaCakes118.exe windows:5 windows x86 arch:x86
c128d1d3767eaecf39ffaa34e778ed1b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
CreateMutexW
GetExitCodeThread
LockResource
GetProcAddress
QueryPerformanceCounter
GetVersionExW
MulDiv
GetCurrentProcessId
HeapAlloc
TerminateProcess
Sleep
WaitForMultipleObjects
FindResourceExW
WaitForSingleObject
SystemTimeToFileTime
SetCurrentDirectoryW
GetCurrentThreadId
HeapCreate
GetBinaryTypeW
GetTickCount
LoadResource
HeapFree
CreateEventW
FileTimeToSystemTime
GetUserDefaultLCID
OpenEventW
FindResourceA
GetStartupInfoW
InitializeCriticalSection
lstrlenW
CreateThread
lstrcmpiW
SetLastError
CloseHandle
DelayLoadFailureHook
EnterCriticalSection
CreateIoCompletionPort
GetSystemDirectoryW
HeapReAlloc
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
VirtualAlloc
lstrlenA
HeapDestroy
CompareStringW
OutputDebugStringA
GetModuleHandleW
GetUserDefaultUILanguage
LeaveCriticalSection
HeapSize
ProcessIdToSessionId
GetCurrentThread
GetQueuedCompletionStatus
FlushInstructionCache
GetSystemInfo
LoadLibraryExA
FindResourceW
FreeLibrary
VirtualFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ResumeThread
RaiseException
ExitProcess
GetSystemTimeAsFileTime
LoadLibraryW
TerminateThread
HeapSetInformation
LocalFree
LoadLibraryA
LocalAlloc
LoadLibraryExW
PostQueuedCompletionStatus
OpenProcess
GetProcessHeap
FormatMessageW
ReleaseMutex
ExpandEnvironmentStringsW
MultiByteToWideChar
GetSystemTime
GetLastError
ResetEvent
GetSystemWindowsDirectoryW
GetVersionExA
SizeofResource
SetEvent
DeleteCriticalSection
user32
IsWindowEnabled
GetFocus
LoadMenuW
MoveWindow
TranslateAcceleratorW
LoadCursorW
CheckDlgButton
UnregisterClassA
LoadStringW
LoadAcceleratorsW
KillTimer
SetWindowLongW
GetMenu
DefWindowProcW
CreateWindowExW
SetWindowTextW
GetWindowLongW
IsDlgButtonChecked
IsWindowVisible
GetClassNameW
DestroyIcon
SetCursor
EnumChildWindows
TranslateMessage
TrackPopupMenuEx
ShowWindow
GetDC
AdjustWindowRectEx
CharNextW
EnableWindow
ReleaseDC
GetProcessDefaultLayout
RegisterClassExW
DestroyMenu
SetWindowPos
GetSystemMetrics
GetSysColor
DestroyWindow
SendMessageW
InvalidateRect
GetMonitorInfoW
IsIconic
LockWindowUpdate
PostMessageW
IsZoomed
PostQuitMessage
GetClassInfoExW
GetKeyState
GetWindowPlacement
GetSysColorBrush
ClientToScreen
SetFocus
CharLowerBuffW
CheckMenuRadioItem
GetDlgItem
GetSubMenu
GetClientRect
GetWindowThreadProcessId
GetMessageW
CallWindowProcW
SystemParametersInfoW
MonitorFromRect
SetTimer
DeleteMenu
GetWindowRect
TrackMouseEvent
DispatchMessageW
EnableMenuItem
GetShellWindow
MonitorFromPoint
IsWindow
BringWindowToTop
GetParent
SetActiveWindow
gdi32
GetDeviceCaps
AbortDoc
GetTextExtentPointA
StartDocA
GetStockObject
StartPage
DeleteDC
EndPage
SetMapMode
TextOutA
SelectObject
EndDoc
SetBkColor
StretchBlt
DeleteObject
ExtTextOutA
CreateFontA
CreateCompatibleDC
CreateSolidBrush
SetBkMode
GetTextMetricsA
SetTextColor
CreateFontIndirectA
SetAbortProc
CreateCompatibleBitmap
GetObjectA
GetTextExtentPoint32A
advapi32
OpenProcessToken
RegOpenKeyA
AdjustTokenPrivileges
StartServiceA
LookupPrivilegeValueA
DeleteService
InitializeSecurityDescriptor
RegDeleteValueA
RegDeleteKeyA
OpenServiceA
RegQueryValueExA
RegSetValueExA
SetSecurityDescriptorDacl
RegCreateKeyA
CloseServiceHandle
RegCloseKey
CreateServiceA
QueryServiceStatus
OpenSCManagerA
ControlService
RegOpenKeyExA
shell32
ShellExecuteExA
SHBrowseForFolderA
SHGetMalloc
Shell_NotifyIconA
ShellExecuteA
SHGetSpecialFolderLocation
ole32
CoResumeClassObjects
CoRevertToSelf
CoInitializeSecurity
CoUninitialize
OleGetClipboard
CoRegisterClassObject
CoRevokeClassObject
CoImpersonateClient
PropVariantClear
OleUninitialize
CoInitialize
CreateStreamOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
OleInitialize
CoTaskMemRealloc
StringFromCLSID
CoGetClassObject
oleaut32
SysAllocString
SafeArrayLock
SafeArrayGetLBound
SafeArrayGetUBound
VariantClear
VariantCopyInd
SysStringLen
SysAllocStringByteLen
SafeArrayDestroy
VariantInit
GetErrorInfo
SafeArrayUnlock
VarUI4FromStr
VarBstrCmp
SysFreeString
VariantCopy
SysAllocStringLen
SafeArrayCreate
LoadRegTypeLi
VarBstrCat
SafeArrayRedim
LoadTypeLi
SysStringByteLen
DispCallFunc
comctl32
ImageList_Add
shlwapi
SHStrDupW
UrlUnescapeW
ColorHLSToRGB
UrlEscapeW
rpcrt4
UuidToStringA
UuidCreateNil
UuidCreate
UuidFromStringA
UuidIsNil
RpcStringFreeA
wldap32
ord22
ord197
gdiplus
GdiplusStartup
msvcrt
malloc
Sections
.text Size: 229KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 353KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 163KB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.textg Size: 162KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ