Static task
static1
Behavioral task
behavioral1
Sample
24f4c09692d3051002ce5c3687bc0b3f_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
24f4c09692d3051002ce5c3687bc0b3f_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
24f4c09692d3051002ce5c3687bc0b3f_JaffaCakes118
-
Size
340KB
-
MD5
24f4c09692d3051002ce5c3687bc0b3f
-
SHA1
5bbc6f72816056fa3d60a5faba40c95adb84eaf8
-
SHA256
2df56f1d4c25860aa89c5e1660ff16d9d42482ced8e491ec5a5b1aaf29a2ae0e
-
SHA512
634dfc5c611557cdcf55f4cab0d436ea4ca615dbf98f7bfbacbe2f7d029d023e4540d73f7120ace82829d3a78e1c95f8f6778af20b6a4c6aa3146fab94557319
-
SSDEEP
6144:11MKzYzL/glofOhL7GBU5jXNCdKxdGVKshWWFjkk9lKVAUUcv4X1SQ:1mKEn/cL7GqgRhkqG7Q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 24f4c09692d3051002ce5c3687bc0b3f_JaffaCakes118
Files
-
24f4c09692d3051002ce5c3687bc0b3f_JaffaCakes118.exe windows:4 windows x86 arch:x86
88528c57e2c4d94bdbb5b736329e61df
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalLock
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
DuplicateHandle
CreateFileA
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
lstrcpyA
FindClose
FindFirstFileA
GetVolumeInformationA
lstrcpynA
GetFullPathNameA
LocalFree
FileTimeToSystemTime
FileTimeToLocalFileTime
SetLastError
FindNextFileA
SetErrorMode
lstrcatA
GlobalAlloc
LocalAlloc
InitializeCriticalSection
TlsAlloc
DeleteCriticalSection
GlobalFree
GlobalUnlock
GlobalHandle
LeaveCriticalSection
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GetFileSize
GetFileTime
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
ExitProcess
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapFree
GetACP
SetStdHandle
GetFileType
HeapAlloc
RaiseException
HeapReAlloc
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetStartupInfoA
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sleep
GetDriveTypeA
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
FreeLibrary
MultiByteToWideChar
GetFileAttributesA
DeleteFileA
SetFileAttributesA
CreateDirectoryA
GetVersionExA
GetCommandLineA
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetCurrentProcess
GetLastError
GetPrivateProfileStringA
GetSystemDirectoryA
GetPrivateProfileIntA
GetModuleFileNameA
GetShortPathNameA
GetCurrentDirectoryA
WaitForSingleObject
WritePrivateProfileStringA
CreateToolhelp32Snapshot
Process32First
OpenProcess
TerminateProcess
Process32Next
CloseHandle
lstrlenA
GetTempPathA
WinExec
user32
TabbedTextOutA
DrawTextA
GrayStringA
LoadStringA
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetWindowPos
SetWindowLongA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetDlgItem
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
MapWindowPoints
LoadIconA
GetDC
ShowWindow
LoadCursorA
GetSysColorBrush
DestroyMenu
GetLastActivePopup
IsWindowEnabled
MessageBoxA
EnableWindow
GetWindowTextA
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetWindowLongA
GetClassNameA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetParent
GetNextDlgTabItem
SetCursor
TranslateMessage
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
CharUpperA
PostMessageA
PostQuitMessage
GetSysColor
ReleaseDC
KillTimer
wsprintfA
DispatchMessageA
GetMessageA
SetTimer
FindWindowA
GetSystemMetrics
SendMessageA
GetMenuItemCount
UnhookWindowsHookEx
advapi32
SetNamedSecurityInfoA
RegDeleteValueA
AllocateAndInitializeSid
RegDeleteKeyA
InitializeAcl
LookupAccountNameA
AddAccessAllowedAce
GetUserNameA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
shell32
SHFileOperationA
ShellExecuteA
SHChangeNotify
ShellExecuteExA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
comctl32
ord17
urlmon
URLDownloadToFileA
wininet
InternetGetConnectedState
gdi32
GetObjectA
Escape
GetClipBox
TextOutA
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetDeviceCaps
ExtTextOutA
CreateBitmap
DeleteObject
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comdlg32
GetFileTitleA
Sections
.text Size: 148KB - Virtual size: 145KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 136KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ