Static task
static1
Behavioral task
behavioral1
Sample
2da4294353f2514010c4876f738c9858_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2da4294353f2514010c4876f738c9858_JaffaCakes118.exe
Resource
win10v2004-20240708-en
General
-
Target
2da4294353f2514010c4876f738c9858_JaffaCakes118
-
Size
205KB
-
MD5
2da4294353f2514010c4876f738c9858
-
SHA1
46b5d9549e9b55d98ab755d62b21494f7cf2e6a0
-
SHA256
3d159c976b74e071b2f096deb3c09059ad00d2c457a45da48dba3077ae8d13a8
-
SHA512
f45a37f71844ddafc5a0c5eedd51082e8800b9f5f63a1b88a1ab3226580b968ba9a23244569c394ce3cc8f6017b4846ab10e1cc4ba1c413eb98d49e2b9726263
-
SSDEEP
6144:SJZqqDLj2j/jGPxg+cMqzo/aGPoYcK23vLrhPxxTyCkD+RP:SJUqnjQjWaVMqzIcDvLVLyCu+RP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2da4294353f2514010c4876f738c9858_JaffaCakes118
Files
-
2da4294353f2514010c4876f738c9858_JaffaCakes118.exe windows:5 windows x86 arch:x86
688a1c7c1074bdffe7f9968ec471072a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenW
FlushFileBuffers
GetTempPathW
GetFileSizeEx
OpenMutexW
GetLastError
GetProcAddress
VirtualProtectEx
VirtualAllocEx
FindClose
LoadLibraryA
RemoveDirectoryW
QueryDosDeviceW
WaitForMultipleObjects
lstrcmpiW
FindNextFileW
VirtualProtect
CreateToolhelp32Snapshot
GetFileTime
FileTimeToLocalFileTime
GetVolumeNameForVolumeMountPointW
DeleteFileW
GetFileInformationByHandle
WriteProcessMemory
SetFileAttributesW
ExpandEnvironmentStringsW
SetEvent
lstrcmpiA
WTSGetActiveConsoleSessionId
Thread32First
GetPrivateProfileStringW
GetPrivateProfileIntW
MapViewOfFile
UnmapViewOfFile
MultiByteToWideChar
CreateFileMappingW
CreateEventW
TlsAlloc
TlsFree
SetHandleInformation
CreatePipe
GetLocalTime
MoveFileExW
GetModuleFileNameW
GetUserDefaultUILanguage
TlsGetValue
TlsSetValue
TerminateProcess
ResetEvent
CreateRemoteThread
Process32FirstW
Process32NextW
GetCommandLineW
SetErrorMode
GetComputerNameW
OpenEventW
DuplicateHandle
GetCurrentProcessId
OpenProcess
WriteFile
VirtualQueryEx
SetFileTime
IsBadReadPtr
GetProcessHeap
VirtualFree
GetCurrentThread
GetModuleHandleW
CreateDirectoryW
CreateFileW
GetTimeZoneInformation
ReadFile
Thread32Next
GetFileAttributesW
lstrcpynW
HeapCreate
HeapDestroy
ReadProcessMemory
Sleep
LoadLibraryW
SetThreadPriority
WideCharToMultiByte
HeapFree
GetLogicalDriveStringsW
SetFilePointerEx
SystemTimeToFileTime
HeapAlloc
CreateProcessW
FreeLibrary
SetEndOfFile
FindFirstFileW
CreateMutexW
HeapReAlloc
GetTempFileNameW
FileTimeToDosDateTime
GetEnvironmentVariableW
CreateThread
GetSystemTime
ExitThread
GetCurrentProcess
LocalFree
ExitProcess
GetVersionExW
GetNativeSystemInfo
ReleaseMutex
GetCurrentThreadId
SetLastError
WaitForSingleObject
GlobalUnlock
GetTickCount
GlobalLock
CloseHandle
GetFileAttributesExW
GetProcessId
EnterCriticalSection
VirtualAlloc
LeaveCriticalSection
VirtualFreeEx
InitializeCriticalSection
SetThreadContext
GetThreadContext
GetModuleHandleA
user32
GetClassNameW
GetMenuState
DefWindowProcA
DefMDIChildProcW
SwitchDesktop
GetMenuItemCount
DefDlgProcA
PostThreadMessageW
DefMDIChildProcA
HiliteMenuItem
RegisterClassW
GetUserObjectInformationW
CallWindowProcA
EndMenu
CallWindowProcW
DefWindowProcW
SystemParametersInfoW
GetShellWindow
MessageBoxA
GetTopWindow
LoadImageW
MsgWaitForMultipleObjects
WindowFromPoint
CharLowerW
CharToOemW
GetMenuItemID
CharLowerA
ReleaseDC
CharUpperW
SetWindowLongW
GetWindow
TrackPopupMenuEx
GetMenuItemRect
RegisterClassExW
DrawIcon
GetIconInfo
GetKeyboardLayoutList
GetSystemMetrics
CharLowerBuffA
MapVirtualKeyW
EndPaint
GetUpdateRgn
GetWindowDC
FillRect
DrawEdge
BeginPaint
GetUpdateRect
IntersectRect
GetDCEx
EqualRect
PrintWindow
ExitWindowsEx
CreateDesktopW
SetProcessWindowStation
CloseWindowStation
CreateWindowStationW
GetProcessWindowStation
CloseDesktop
OpenWindowStationW
SetThreadDesktop
RegisterClassExA
RegisterWindowMessageW
DefFrameProcW
GetThreadDesktop
DispatchMessageW
GetMessageA
GetWindowRect
SetKeyboardState
GetSubMenu
DefDlgProcW
DefFrameProcA
OpenInputDesktop
OpenDesktopW
GetMessageW
SetCapture
PostMessageW
GetParent
GetWindowInfo
GetClassLongW
GetCapture
SetCursorPos
GetWindowLongW
GetAncestor
PeekMessageW
PeekMessageA
SetWindowPos
GetCursorPos
SendMessageTimeoutW
IsWindow
ReleaseCapture
SendMessageW
MenuItemFromPoint
GetDC
GetMenu
MapWindowPoints
GetMessagePos
GetWindowThreadProcessId
IsRectEmpty
TranslateMessage
GetKeyboardState
GetClipboardData
ToUnicode
RegisterClassA
advapi32
CreateProcessAsUserA
CreateProcessAsUserW
ConvertSidToStringSidW
CryptGetHashParam
OpenProcessToken
GetSidSubAuthority
CryptAcquireContextW
OpenThreadToken
GetSidSubAuthorityCount
GetTokenInformation
RegCreateKeyExW
CryptReleaseContext
RegQueryValueExW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetNamedSecurityInfoW
LookupPrivilegeValueW
CryptCreateHash
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegOpenKeyExW
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
CryptDestroyHash
AdjustTokenPrivileges
RegCloseKey
RegSetValueExW
CryptHashData
EqualSid
RegEnumKeyExW
RegCreateKeyW
RegEnumKeyW
RegQueryInfoKeyW
SetSecurityInfo
InitiateSystemShutdownExW
GetLengthSid
IsWellKnownSid
shlwapi
PathMatchSpecW
PathQuoteSpacesW
PathIsURLW
StrStrIW
StrStrIA
PathRenameExtensionW
StrCmpNIW
wvnsprintfA
StrCmpNIA
UrlUnescapeA
PathRemoveBackslashW
PathUnquoteSpacesW
PathAddExtensionW
PathCombineW
SHDeleteKeyW
PathSkipRootW
SHDeleteValueW
PathAddBackslashW
PathRemoveFileSpecW
PathFindFileNameW
PathIsDirectoryW
wvnsprintfW
shell32
CommandLineToArgvW
ShellExecuteW
SHGetFolderPathW
secur32
GetUserNameExW
ole32
CoSetProxyBlanket
CoUninitialize
CLSIDFromString
StringFromGUID2
CoInitializeSecurity
CoInitialize
CoInitializeEx
CoCreateInstance
gdi32
DeleteObject
GetDIBits
GetDeviceCaps
CreateDIBSection
CreateCompatibleDC
SelectObject
DeleteDC
RestoreDC
SaveDC
SetRectRgn
GdiFlush
SetViewportOrgEx
CreateCompatibleBitmap
ws2_32
send
closesocket
WSASetLastError
freeaddrinfo
socket
bind
recv
sendto
inet_addr
WSASend
gethostbyname
WSAEventSelect
getpeername
recvfrom
WSAIoctl
listen
accept
shutdown
getsockname
WSAGetLastError
select
getaddrinfo
WSAStartup
WSAAddressToStringW
connect
setsockopt
crypt32
PFXExportCertStoreEx
CertDuplicateCertificateContext
CertEnumCertificatesInStore
CertCloseStore
CertOpenSystemStoreW
CertDeleteCertificateFromStore
PFXImportCertStore
CryptUnprotectData
wininet
InternetReadFile
InternetSetOptionA
HttpOpenRequestA
HttpSendRequestA
InternetQueryOptionA
HttpEndRequestW
HttpEndRequestA
InternetSetFilePointer
HttpOpenRequestW
HttpAddRequestHeadersW
InternetSetStatusCallbackW
GetUrlCacheEntryInfoW
HttpSendRequestW
InternetReadFileExA
InternetQueryDataAvailable
HttpSendRequestExW
HttpSendRequestExA
HttpAddRequestHeadersA
InternetSetStatusCallbackA
InternetCrackUrlA
InternetCloseHandle
HttpQueryInfoA
InternetConnectA
InternetQueryOptionW
InternetOpenA
oleaut32
SysFreeString
VariantInit
SysAllocString
VariantClear
netapi32
NetUserEnum
NetApiBufferFree
NetUserGetInfo
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
winmm
PlaySoundW
waveOutSetVolume
waveOutGetVolume
PlaySoundA
Sections
.text Size: 193KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ