Static task
static1
Behavioral task
behavioral1
Sample
27be5b4e820a1a1b8e6f476a30ed2d20_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
27be5b4e820a1a1b8e6f476a30ed2d20_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
27be5b4e820a1a1b8e6f476a30ed2d20_JaffaCakes118
-
Size
2.1MB
-
MD5
27be5b4e820a1a1b8e6f476a30ed2d20
-
SHA1
459cec92eeeed862db909d03dbea1631e81bab93
-
SHA256
2dcb146aad5d57e9e04aece2f5c61be79b3c31d300df4a24efb101b98685a6ae
-
SHA512
9e6f0c031e24f1bbf2895dc0e8cb83050ff9cb2d67a9450371f6b5a7133323cafb3f69a81ad10e8d9cbb7ae62a88565df05e10a301672cb9b8e651e704f75555
-
SSDEEP
49152:NQ878Hdsf40nwTqie1H1thxBkN52OioomwRhh:+Js3nh1H15Bkf2OioURr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 27be5b4e820a1a1b8e6f476a30ed2d20_JaffaCakes118
Files
-
27be5b4e820a1a1b8e6f476a30ed2d20_JaffaCakes118.exe windows:4 windows x86 arch:x86
7f25fc01c86cc4dad87d770966004360
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetConnectA
InternetOpenA
InternetAutodial
InternetGetConnectedState
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
ws2_32
closesocket
WSACleanup
WSAStartup
gethostbyname
inet_ntoa
psapi
EnumProcessModules
EnumProcesses
GetModuleFileNameExA
shlwapi
PathFindExtensionA
PathFindFileNameA
PathIsUNCA
PathStripToRootA
PathFileExistsA
StrCmpNA
winmm
timeGetTime
gdiplus
GdipCreateBitmapFromResource
GdipCloneBrush
GdipDrawImageRectRectI
GdipDrawImageRectI
GdipDrawString
GdipGetImageGraphicsContext
GdipCreateFromHDC
GdipCreateSolidFill
GdipBitmapGetPixel
GdipGetImageHeight
GdipGetImageWidth
GdipDeleteFont
GdipCreateFont
GdipDeleteFontFamily
GdipGetGenericFontFamilySansSerif
GdipCreateFontFamilyFromName
GdipDeleteGraphics
GdipSetSolidFillColor
GdipDeleteBrush
GdiplusStartup
GdiplusShutdown
GdipCloneImage
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipDisposeImage
GdipAlloc
GdipFree
user32
AppendMenuA
PostQuitMessage
DrawIcon
SetRect
PtInRect
MessageBoxA
wsprintfA
RegisterClipboardFormatA
UnpackDDElParam
ReuseDDElParam
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
MessageBeep
InvalidateRgn
CopyAcceleratorTableA
CharNextA
GetSysColorBrush
GetMenuItemInfoA
EndPaint
BeginPaint
ShowWindow
LoadImageA
SendMessageA
PostMessageA
MoveWindow
SetWindowTextA
IsDialogMessageA
WinHelpA
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetSystemMenu
IsIconic
SetWindowRgn
GetClientRect
GetClassNameA
SetPropA
GetPropA
GetWindowDC
SendDlgItemMessageA
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
GetMessageTime
InvalidateRect
SetTimer
KillTimer
EnableWindow
LoadIconA
CloseWindow
UnregisterClassA
GetSystemMetrics
LoadStringA
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetScrollRange
GetMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
GetKeyState
PeekMessageA
ValidateRect
GetLastActivePopup
IsWindowEnabled
ShowOwnedPopups
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
GetMenu
GetMenuItemID
GetMenuItemCount
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
SetWindowLongA
IntersectRect
GetWindowPlacement
SetFocus
GetDlgCtrlID
IsChild
LoadCursorA
IsRectEmpty
RegisterWindowMessageA
SystemParametersInfoA
AdjustWindowRectEx
UnhookWindowsHookEx
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
PostThreadMessageA
FindWindowA
LoadBitmapA
CharUpperA
CopyRect
InflateRect
OffsetRect
FillRect
DrawFocusRect
GetWindowRect
ClientToScreen
GetActiveWindow
GetNextDlgTabItem
GetParent
WindowFromPoint
GetWindowLongA
SetCursor
GetSubMenu
GetSysColor
ReleaseDC
GetDC
LoadMenuA
DestroyMenu
ScreenToClient
GetCursorPos
ReleaseCapture
GetCapture
DrawEdge
GetNextDlgGroupItem
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
IsWindow
GetDlgItem
EndDialog
SetMenuItemBitmaps
GetFocus
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
SetWindowsHookExA
SetCapture
UpdateWindow
GetDesktopWindow
RemovePropA
CallNextHookEx
kernel32
PeekNamedPipe
SetEnvironmentVariableA
IsBadCodePtr
IsBadReadPtr
GetTimeZoneInformation
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
CreateProcessA
CloseHandle
ReleaseMutex
CopyFileA
Sleep
GetCurrentDirectoryA
GlobalUnlock
GlobalLock
GlobalAlloc
LoadResource
SizeofResource
FindResourceA
LocalFree
FormatMessageA
GetLastError
CreateMutexA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
LockResource
GetPrivateProfileIntA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
WaitForSingleObject
ResumeThread
CreateThread
SetCurrentDirectoryA
lstrcmpA
lstrcpyA
GetModuleFileNameA
GetCurrentThreadId
GetVersion
lstrcmpiA
lstrlenW
CompareStringA
CompareStringW
CreateEventA
ResetEvent
SetEvent
UnmapViewOfFile
MapViewOfFileEx
CreateFileMappingA
GetFileSize
CreateFileA
TerminateThread
OutputDebugStringA
OpenProcess
DeleteFileA
InterlockedDecrement
GetDiskFreeSpaceExA
GetPrivateProfileStringA
SetFilePointer
ReadFile
SystemTimeToFileTime
LocalFileTimeToFileTime
CreateDirectoryA
GetFileAttributesA
SetFileTime
WriteFile
FileTimeToSystemTime
GetFileInformationByHandle
MapViewOfFile
GetTickCount
MoveFileA
FileTimeToLocalFileTime
GetFileTime
FindClose
FindNextFileA
FindFirstFileA
GetFileType
GetSystemInfo
SetEndOfFile
GetStringTypeW
LCMapStringW
GetCPInfo
LCMapStringA
GetStringTypeA
LoadLibraryA
EnumResourceLanguagesA
ConvertDefaultLocale
GetProcAddress
GetModuleHandleA
GlobalDeleteAtom
FreeLibrary
GetCurrentThread
GlobalAddAtomA
FreeResource
GlobalFree
SetLastError
MulDiv
lstrcpynA
lstrcmpW
lstrcatA
GlobalFindAtomA
GlobalGetAtomNameA
FlushFileBuffers
LockFile
UnlockFile
DuplicateHandle
GetCurrentProcess
GetVolumeInformationA
GetFullPathNameA
WritePrivateProfileStringA
InterlockedIncrement
GlobalFlags
LocalAlloc
LeaveCriticalSection
GlobalReAlloc
GlobalHandle
EnterCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
SetFileAttributesA
GetOEMCP
SetErrorMode
ExitProcess
TerminateProcess
RtlUnwind
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
VirtualQuery
GetDriveTypeA
GetStartupInfoA
GetCommandLineA
HeapReAlloc
SetHandleCount
GetStdHandle
SetStdHandle
HeapSize
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
gdi32
GetTextExtentPoint32A
GetTextColor
GetBkColor
GetMapMode
CreateRectRgnIndirect
CreateSolidBrush
CreatePatternBrush
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetWindowExtEx
GetViewportExtEx
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
GetClipBox
Ellipse
LPtoDP
CreateEllipticRgn
CombineRgn
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateFontIndirectA
SelectClipRgn
GetPixel
CreateBitmap
SetBkColor
SetTextColor
DeleteDC
GetStockObject
DeleteObject
BitBlt
CreateCompatibleBitmap
StretchBlt
GetObjectA
SetBkMode
CreateCompatibleDC
SelectObject
GetRgnBox
CreateRectRgn
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyA
RegQueryValueA
RegCloseKey
shell32
DragQueryFileA
DragFinish
SHFileOperationA
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteExA
comctl32
_TrackMouseEvent
ord17
ImageList_Destroy
ImageList_Draw
ImageList_GetImageInfo
oledlg
ord8
ole32
OleFlushClipboard
CoRegisterMessageFilter
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
CreateStreamOnHGlobal
OleIsCurrentClipboard
CoRevokeClassObject
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoTaskMemAlloc
OleInitialize
oleaut32
SafeArrayGetUBound
VariantClear
SysAllocString
VariantCopy
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetLBound
VariantChangeType
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayDestroy
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocStringByteLen
SysStringLen
SysAllocStringLen
VariantInit
SysFreeString
Sections
.text Size: 488KB - Virtual size: 485KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
STLPORT_ Size: 4KB - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ