Static task
static1
Behavioral task
behavioral1
Sample
2521bfce0359111f3339643e75ca6a64_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2521bfce0359111f3339643e75ca6a64_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2521bfce0359111f3339643e75ca6a64_JaffaCakes118
-
Size
372KB
-
MD5
2521bfce0359111f3339643e75ca6a64
-
SHA1
17c890d81ad526db397c4dc0a54bf70f7c027eed
-
SHA256
d95b9a363ba2aba3dd54d2513b3a1b3bd3ac2d2cf932f98d1fbd1700ccd41372
-
SHA512
f9864b38cde5d1c7e9678e58e7f4409aeeed7182ffca757b0126098aca611912e8066ca60f0f9012b35bb9e8220f373746badc19b31e9ca5c840e999ab545079
-
SSDEEP
6144:JNsYxnCjFjqNyAF3QJw2V5gZtwfTCEc5u7XIOahfrJUDnBLLwrsdE45G:JN5xnUjqNyAdg5+ta23g09hfrJUDnBLo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2521bfce0359111f3339643e75ca6a64_JaffaCakes118
Files
-
2521bfce0359111f3339643e75ca6a64_JaffaCakes118.exe windows:4 windows x86 arch:x86
d1000e45a1a583deba7b0536b8dc36a2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
OleCreate
OleSetContainedObject
CoInitialize
OleInitialize
OleUninitialize
CoUninitialize
shlwapi
PathFileExistsA
SHDeleteKeyA
wininet
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetSetFilePointer
InternetReadFile
InternetGetConnectedState
InternetOpenA
InternetSetOptionA
InternetOpenUrlA
HttpQueryInfoA
InternetCloseHandle
InternetCrackUrlA
InternetTimeToSystemTime
user32
GetAsyncKeyState
CharPrevA
CharNextA
MessageBoxA
CreateDialogParamA
SendDlgItemMessageA
LoadStringA
EnumWindows
GetWindowThreadProcessId
PostMessageA
GetClassNameA
GetSysColor
CreatePopupMenu
InsertMenuA
TrackPopupMenu
DestroyMenu
RedrawWindow
PeekMessageA
KillTimer
EnableWindow
GetClassInfoExA
LoadCursorA
LoadIconA
RegisterClassExA
GetSystemMetrics
CreateWindowExA
UpdateWindow
SetTimer
GetMessageA
TranslateMessage
DispatchMessageA
DialogBoxParamA
SetWindowRgn
DestroyWindow
ClientToScreen
GetCursorPos
ScreenToClient
GetFocus
BeginPaint
GetWindowLongA
SetFocus
GetForegroundWindow
GetWindowRect
PtInRect
InvalidateRect
DefWindowProcA
SetWindowTextA
SetDlgItemTextA
SendMessageA
GetDlgItem
SetForegroundWindow
SetActiveWindow
SetWindowPos
ShowWindow
EndDialog
LoadImageA
GetDC
ReleaseDC
DrawTextW
SetWindowLongA
GetClientRect
EndPaint
oleaut32
SysAllocStringLen
VariantClear
VariantInit
DispGetIDsOfNames
SysAllocString
SysFreeString
gdi32
SetPixel
BitBlt
SelectClipRgn
GetDeviceCaps
CreateBitmap
GetObjectA
CreateRectRgn
GetPixel
CombineRgn
CreatePatternBrush
StretchBlt
SetBkMode
SetTextColor
GetTextExtentPointW
CreateCompatibleDC
SelectObject
GetCharWidth32W
DeleteDC
CreateFontW
DeleteObject
CreateSolidBrush
advapi32
RegOpenKeyA
RegQueryValueExA
OpenProcessToken
DuplicateTokenEx
GetLengthSid
SetTokenInformation
CreateProcessAsUserA
AllocateAndInitializeSid
RegOpenKeyExA
RegCloseKey
RegSetValueA
RegQueryValueA
GetUserNameA
shell32
ShellExecuteExA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetSpecialFolderPathA
Shell_NotifyIconA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
kernel32
SetUnhandledExceptionFilter
GetTimeZoneInformation
DeleteCriticalSection
FlushFileBuffers
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
SetEndOfFile
LocalFileTimeToFileTime
SetFileTime
GetFullPathNameA
SetCurrentDirectoryA
SetEnvironmentVariableA
FileTimeToLocalFileTime
FileTimeToSystemTime
HeapSize
GetDateFormatA
GetTimeFormatA
GetCPInfo
GetOEMCP
GetACP
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
SetHandleCount
HeapAlloc
GetCommandLineA
GetStartupInfoA
GetLocalTime
RaiseException
RtlUnwind
GetSystemTimeAsFileTime
ExitProcess
CopyFileA
SetFileAttributesA
GetCurrentDirectoryA
SetErrorMode
GetVersion
GetSystemInfo
GetWindowsDirectoryA
MoveFileA
CreateDirectoryA
GetFileAttributesA
GetTempPathA
GetDiskFreeSpaceA
RemoveDirectoryA
GetCurrentProcess
LocalFree
lstrlenA
FindClose
GetFileTime
SystemTimeToFileTime
CompareFileTime
GetDriveTypeA
WaitForSingleObject
GetStdHandle
GetFileType
SetFilePointer
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
VirtualProtect
VirtualQuery
SetStdHandle
InterlockedExchange
InitializeCriticalSection
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
HeapFree
SetEnvironmentVariableW
FindResourceA
LoadResource
LockResource
GetModuleFileNameA
FreeLibrary
LoadLibraryA
ReadFile
FindFirstFileA
FindNextFileA
GetLastError
GlobalFree
GlobalAlloc
MultiByteToWideChar
WideCharToMultiByte
lstrcpyA
GetModuleHandleA
Sleep
GetTickCount
CreateFileA
CloseHandle
GetFileSize
WriteFile
InterlockedIncrement
InterlockedDecrement
CreateMutexA
OpenMutexA
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
DeleteFileA
CreateThread
GetLocaleInfoA
GetVersionExA
GetProcAddress
Sections
.text Size: 296KB - Virtual size: 293KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ