Static task
static1
Behavioral task
behavioral1
Sample
333b2e37dcc2f08f09b247628253fb2b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
333b2e37dcc2f08f09b247628253fb2b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
333b2e37dcc2f08f09b247628253fb2b_JaffaCakes118
-
Size
492KB
-
MD5
333b2e37dcc2f08f09b247628253fb2b
-
SHA1
4d66431b01cfb9f26b11a34d5706f1d9d929e210
-
SHA256
0f69deaf48c10740d7b86920659344558587de7d0ce083c8d7ccabc3eb50a057
-
SHA512
d8d623fde217713ba4afc28a3807971769ba11c70c28e82a1180e0332d6fd289106008b5622c8d273aa46fa3d14213b631f69474670ae22680726e558cc411d8
-
SSDEEP
6144:7oRtXDR068o/tvUvFpb5fi75HkHnzcj8/IqXjsM25GaJY8iKrMk+pVs3qi8RKsTK:UJefi9HkHnZsM2FJY8PGsH8MsTJr5y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 333b2e37dcc2f08f09b247628253fb2b_JaffaCakes118
Files
-
333b2e37dcc2f08f09b247628253fb2b_JaffaCakes118.exe windows:4 windows x86 arch:x86
55833437655e8b684d368f6681be867b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
shlwapi
PathIsUNCA
PathFindFileNameA
PathFileExistsA
PathStripToRootA
PathFindExtensionA
SHGetValueA
advapi32
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
SetSecurityDescriptorDacl
RegOpenKeyA
RegDeleteKeyA
kernel32
GetVersionExA
lstrcmpW
GlobalFindAtomA
GetModuleFileNameW
InterlockedDecrement
InterlockedIncrement
FileTimeToSystemTime
FileTimeToLocalFileTime
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
WritePrivateProfileStringA
GlobalFlags
SetErrorMode
GetFileAttributesA
GetFileTime
GetCPInfo
GetOEMCP
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
GlobalGetAtomNameA
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
ExitProcess
GetCommandLineA
GetProcessHeap
GetStartupInfoA
WriteConsoleW
GetFileType
GetStdHandle
RtlUnwind
ExitThread
CreateThread
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
GetConsoleCP
GetConsoleMode
Sleep
GetACP
GetTimeZoneInformation
LCMapStringA
LCMapStringW
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
DebugBreak
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
GetStringTypeA
GetStringTypeW
SetEnvironmentVariableA
GetFullPathNameA
FindFirstFileA
FindClose
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
ReleaseSemaphore
CreateSemaphoreA
GetCurrentProcessId
GlobalAddAtomA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalDeleteAtom
GetModuleHandleA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
MulDiv
CreateEventA
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
RaiseException
LocalAlloc
SetFilePointer
WriteFile
ReadFile
CreateFileA
FreeResource
LocalFree
GetCurrentProcess
CreateMutexA
FreeLibrary
GetCurrentThreadId
SetLastError
GetModuleFileNameA
GetVolumeInformationA
GetVersion
CompareStringA
lstrcmpiA
InterlockedExchange
MultiByteToWideChar
CompareStringW
lstrlenA
SetFileTime
CloseHandle
SystemTimeToFileTime
CompareFileTime
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GetProcAddress
LoadLibraryA
GetTempPathA
GetLastError
VirtualProtect
user32
BeginPaint
EndPaint
DestroyMenu
UnregisterClassA
ReleaseDC
GetSysColorBrush
ShowWindow
IsDialogMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
GrayStringA
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
GetLastActivePopup
MessageBoxA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
PostQuitMessage
PostMessageA
GetMenuState
DrawTextExA
DrawTextA
TabbedTextOutA
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
SendMessageA
GetKeyState
PeekMessageA
ValidateRect
wsprintfA
GetParent
GetClassNameA
GetSystemMetrics
SendMessageTimeoutA
RegisterWindowMessageA
EnumChildWindows
EnumThreadWindows
WaitForInputIdle
BringWindowToTop
GetWindowThreadProcessId
SetWindowTextA
GetClientRect
EnableWindow
SetTimer
EnumWindows
GetWindowTextA
GetCursorPos
CharUpperA
ClientToScreen
LoadCursorA
GetDC
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
SelectObject
GetStockObject
ExtTextOutA
GetClipBox
CreateBitmap
GetDeviceCaps
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
DeleteObject
GetObjectA
SetBkColor
SetTextColor
Escape
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
ole32
OleRun
CoUninitialize
CoInitialize
CoGetMalloc
CoCreateInstance
CoDisconnectObject
oleaut32
LoadTypeLi
SysAllocString
VariantClear
SysAllocStringLen
VariantInit
VariantCopy
GetErrorInfo
VariantChangeType
SysFreeString
SysStringLen
SysAllocStringByteLen
Sections
.text Size: 384KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ