InetFunctionForRecoverLow
Static task
static1
Behavioral task
behavioral1
Sample
28ef1c84a5ebea3372e9c83248d1f9c6_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
28ef1c84a5ebea3372e9c83248d1f9c6_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
28ef1c84a5ebea3372e9c83248d1f9c6_JaffaCakes118
-
Size
388KB
-
MD5
28ef1c84a5ebea3372e9c83248d1f9c6
-
SHA1
33cc9be8f4f3a2e44b1d1ba509623fb2397e73e3
-
SHA256
4177a053e5b2fd784d64a936fbd245809a86d1fd4b52069e0b96c110e3c56ac7
-
SHA512
ef21488d96945d80ce3be369f317e8843e9efbab5d0bbedcfec3b89d3e7fc9895572d32e510abb4e922ac063c6b37b0fa2607f8f0d7d275acb3458d97e8d464d
-
SSDEEP
6144:9AftnVLGUBVyYygpU6v0hWKB0PeKFR8V3/aEmMEgHrURkmxT:9AftnrNU660dR8V3/7mVum5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 28ef1c84a5ebea3372e9c83248d1f9c6_JaffaCakes118
Files
-
28ef1c84a5ebea3372e9c83248d1f9c6_JaffaCakes118.exe windows:4 windows x86 arch:x86
7610147ccd99ec1caec74827d3c13ed9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHSetValueW
StrCatW
PathAppendW
PathFileExistsW
SHGetValueW
StrToIntW
wininet
HttpSendRequestW
InternetOpenW
InternetConnectW
InternetCloseHandle
HttpOpenRequestW
HttpQueryInfoW
kernel32
DeleteCriticalSection
TlsFree
GetModuleHandleA
lstrcmpW
GlobalFlags
GetVersionExA
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
InterlockedExchange
GetLocaleInfoW
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCommandLineA
LocalReAlloc
GetProcessHeap
GetStartupInfoA
HeapReAlloc
RtlUnwind
RaiseException
HeapSize
GetStdHandle
GetModuleFileNameA
GetFileType
CreateFileA
SetStdHandle
SetHandleCount
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetLocaleInfoA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetModuleHandleW
GetVersion
InterlockedDecrement
ReleaseSemaphore
CreateSemaphoreW
CreateFileW
GetCurrentProcess
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
GetSystemTime
LocalFree
FileTimeToLocalFileTime
GetCurrentThreadId
GetLocalTime
FileTimeToSystemTime
FormatMessageW
lstrlenW
WideCharToMultiByte
GetCurrentProcessId
ReleaseMutex
InterlockedCompareExchange
WaitForSingleObject
InterlockedIncrement
FreeLibrary
FindClose
FindNextFileW
FindFirstFileW
GetModuleFileNameW
GetProcAddress
LoadLibraryW
Sleep
CreateDirectoryW
GetTempPathW
CreateProcessW
CloseHandle
GetLastError
CreateMutexW
SetLastError
FindResourceW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
HeapAlloc
user32
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
LoadIconW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetWindowsHookExW
CallNextHookEx
GetKeyState
PeekMessageW
ValidateRect
SetWindowPos
SetWindowLongW
GetDlgItem
GetFocus
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
SetWindowTextW
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetWindowThreadProcessId
SendMessageW
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
UnhookWindowsHookEx
LoadCursorW
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowTextW
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
IsWindow
IsWindowVisible
EnableWindow
DispatchMessageW
TranslateMessage
SetMessageExtraInfo
GetMessageW
SetTimer
CreateWindowExW
RegisterClassExW
DefWindowProcW
PostQuitMessage
GetMessageExtraInfo
MessageBoxW
RegisterWindowMessageW
PtInRect
UnregisterClassA
gdi32
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
CreateBitmap
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
DeleteObject
GetClipBox
SetMapMode
DeleteDC
winspool.drv
OpenPrinterW
ClosePrinter
DocumentPropertiesW
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegQueryValueW
RegOpenKeyW
RegEnumValueW
RegQueryInfoKeyW
RegOpenKeyExW
shell32
SHGetFolderPathW
SHGetSpecialFolderPathW
ShellExecuteW
ole32
CoInitializeEx
oleaut32
VariantInit
VariantClear
VariantChangeType
Exports
Exports
Sections
.text Size: 304KB - Virtual size: 303KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ