Static task
static1
Behavioral task
behavioral1
Sample
255eacbc1cf0db2a9980cb0a942e1f1a_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
255eacbc1cf0db2a9980cb0a942e1f1a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
255eacbc1cf0db2a9980cb0a942e1f1a_JaffaCakes118
-
Size
285KB
-
MD5
255eacbc1cf0db2a9980cb0a942e1f1a
-
SHA1
d82b027660192d85371ea2a830bb3d33b87c8674
-
SHA256
85bd2cb4ad73aeb7614098e2ea5b65a2e75739b0e2f9b966cb84f4c09e6ef133
-
SHA512
46be6690cfaa756752d358c4237df4400ad706b7c86bb480781ed3b887799774204bef2c39746a75841445c4518e9a7ab69835551757b0cae0b35c7a5e133604
-
SSDEEP
6144:0RVLYiT6Dj98yV0y0epBd4WJ75omF/ToawZV1t:8VLYiT6DDHdTB9UX3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 255eacbc1cf0db2a9980cb0a942e1f1a_JaffaCakes118
Files
-
255eacbc1cf0db2a9980cb0a942e1f1a_JaffaCakes118.exe windows:1 windows x86 arch:x86
64f727cd005fac2d530c407e5771a0a9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetSaveFileNameA
gdi32
BeginPath
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontIndirectA
CreatePen
DPtoLP
DeleteDC
DeleteObject
EndPath
ExtCreatePen
GetDeviceCaps
GetMapMode
GetObjectA
GetTextMetricsA
ModifyWorldTransform
Polyline
RestoreDC
SaveDC
SelectObject
SetBkColor
SetGraphicsMode
SetMapMode
SetTextColor
SetViewportOrgEx
SetWindowOrgEx
StrokePath
TextOutA
shell32
FindExecutableA
SHGetFolderPathA
ShellExecuteA
Shell_NotifyIconA
ole32
CoCreateInstance
CoInitialize
CoInitializeSecurity
CoSetProxyBlanket
CoUninitialize
advapi32
AllocateAndInitializeSid
CloseServiceHandle
CryptAcquireContextA
CryptCreateHash
CryptDecrypt
CryptDeriveKey
CryptDestroyHash
CryptDestroyKey
CryptEncrypt
CryptHashData
CryptReleaseContext
EqualSid
FreeSid
GetSidSubAuthorityCount
GetSidSubAuthority
GetTokenInformation
InitializeSecurityDescriptor
OpenProcessToken
OpenSCManagerA
OpenServiceA
QueryServiceStatus
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyExA
RegFlushKey
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegSetKeySecurity
RegSetValueExA
SetEntriesInAclA
SetNamedSecurityInfoA
SetSecurityDescriptorDacl
user32
AllowSetForegroundWindow
BeginPaint
CharLowerA
CharUpperA
CloseDesktop
CreateWindowExA
DefWindowProcA
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawIconEx
DrawTextA
EnableMenuItem
EnableWindow
EndDialog
EndPaint
EnumDesktopWindows
FillRect
FindWindowA
GetClientRect
GetDC
GetDlgItem
GetDlgItemTextA
GetMenu
GetMessageA
GetParent
GetSysColor
GetSysColorBrush
GetSystemMetrics
GetWindowRect
InvalidateRect
IsDialogMessageA
IsWindow
KillTimer
LoadCursorA
LoadIconA
LoadImageA
MessageBoxA
ModifyMenuA
MoveWindow
OpenDesktopA
PostMessageA
PostQuitMessage
RegisterClassExA
ReleaseDC
SendMessageA
SetDlgItemTextA
SetFocus
SetTimer
SetWindowPos
SetWindowTextA
ShowWindow
TranslateMessage
UpdateWindow
wsprintfA
wininet
HttpQueryInfoA
InternetCloseHandle
InternetGetLastResponseInfoA
InternetOpenA
InternetOpenUrlA
InternetReadFile
setupapi
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsA
SetupDiGetDeviceInterfaceDetailA
SetupDiGetDeviceRegistryPropertyA
rpcrt4
NdrClientInitializeNew
NdrConvert
NdrFreeBuffer
NdrGetBuffer
NdrSendReceive
NdrSimpleStructBufferSize
NdrSimpleStructMarshall
RpcBindingFree
RpcBindingFromStringBindingA
RpcBindingSetAuthInfoA
RpcStringBindingComposeA
RpcStringFreeA
winmm
PlaySoundA
comctl32
ord17
oleaut32
SafeArrayGetElement
VariantClear
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
VariantInit
SysFreeString
SysAllocString
kernel32
CloseHandle
CreateDirectoryA
CreateEventA
CreateFileA
CreatePipe
CreateProcessA
CreateThread
DeleteCriticalSection
DeleteFileA
DeviceIoControl
DosDateTimeToFileTime
EnterCriticalSection
ExitProcess
ExitThread
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsA
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetComputerNameExA
GetConsoleMode
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentProcess
GetCurrentThreadId
GetCurrentThread
GetDiskFreeSpaceA
GetDriveTypeA
GetEnvironmentStrings
GetExitCodeProcess
GetFileAttributesA
GetFileInformationByHandle
GetFileSize
GetFileTime
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetStdHandle
GetSystemWindowsDirectoryA
GetTempFileNameA
GetTempPathA
GetTimeZoneInformation
GetVersionExA
GetVersion
GetVolumeInformationA
GlobalAlloc
GlobalFree
GlobalLock
GlobalMemoryStatusEx
GlobalUnlock
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalFileTimeToFileTime
LocalFree
MoveFileA
MoveFileExA
MultiByteToWideChar
OpenEventA
ReadConsoleInputA
ReadFile
RemoveDirectoryA
RtlUnwind
SetConsoleCtrlHandler
SetConsoleMode
SetCurrentDirectoryA
SetEnvironmentVariableA
SetEnvironmentVariableW
SetEvent
SetFileAttributesA
SetFilePointerEx
SetFilePointer
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
Sleep
SleepEx
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteFile
WritePrivateProfileStringA
lstrcatA
lstrcpyA
lstrlenA
ws2_32
ntohl
WSAStartup
gethostbyaddr
inet_addr
inet_ntoa
WSAGetLastError
gethostbyname
gethostname
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
AUTO Size: 189KB - Virtual size:
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 8KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DGROUP Size: 47KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 219KB - Virtual size:
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.desc Size: 512B - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 22KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ