Static task
static1
Behavioral task
behavioral1
Sample
34f5cd1351f3a9d6174d8d5ab8f48c2d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
34f5cd1351f3a9d6174d8d5ab8f48c2d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
34f5cd1351f3a9d6174d8d5ab8f48c2d_JaffaCakes118
-
Size
36KB
-
MD5
34f5cd1351f3a9d6174d8d5ab8f48c2d
-
SHA1
b3a0fa95cd1303ee9fc03780f4f83c71f45430f5
-
SHA256
9f2aed729876f264fbf5921a2edffffa7c81f710cad76e32c6cd9ec483b11297
-
SHA512
1137a3a4ad1859feb33545480a4e9150ac789b5662bc8bb07c0061dcdcba666c123ceeae9ca465f742110add1b251091d03e0ea728052095b75471020aea8c57
-
SSDEEP
768:AlvvUvlV9+ZHFsF4tEIGSe+jy/c4DT6OhiM4a9DjS95S:rvlD0tEdS8/zX6OhiODjqS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 34f5cd1351f3a9d6174d8d5ab8f48c2d_JaffaCakes118
Files
-
34f5cd1351f3a9d6174d8d5ab8f48c2d_JaffaCakes118.exe windows:4 windows x86 arch:x86
40b2e897af671bc65c1b1d55d648979d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDriveStringsA
LoadLibraryA
GetProcAddress
LoadLibraryW
PostQueuedCompletionStatus
WinExec
BuildCommDCBAndTimeoutsW
OpenMutexW
CreateJobObjectA
CreateFileW
GetFileAttributesExW
GetTapeParameters
GetShortPathNameW
GetStringTypeExA
HeapAlloc
RaiseException
WritePrivateProfileStructA
LoadLibraryExA
GetSystemTime
SystemTimeToFileTime
LockFileEx
GetProfileIntA
CreateWaitableTimerA
GetCommandLineW
GetAtomNameW
CommConfigDialogW
GetEnvironmentVariableA
Heap32ListNext
SetProcessWorkingSetSize
EnumLanguageGroupLocalesW
SetSystemTimeAdjustment
VerLanguageNameA
OpenJobObjectW
FindCloseChangeNotification
GetStartupInfoA
Thread32Next
AddConsoleAliasA
SetComputerNameA
GetCPInfoExA
GetFullPathNameA
UnlockFile
FreeLibrary
GetCurrentConsoleFont
GetComputerNameA
EnumResourceTypesA
CancelWaitableTimer
BackupWrite
GetStringTypeA
WritePrivateProfileSectionW
ReadConsoleA
FillConsoleOutputAttribute
GetTapeStatus
VerifyVersionInfoA
ReadConsoleOutputCharacterW
SetDefaultCommConfigA
FindNextVolumeMountPointA
VirtualProtectEx
GetComputerNameExA
GetLocaleInfoA
AddAtomA
WriteTapemark
GetVolumeNameForVolumeMountPointW
FindResourceExW
Heap32First
ClearCommError
CreateHardLinkA
GetLongPathNameW
SetPriorityClass
ContinueDebugEvent
GetHandleInformation
BuildCommDCBA
SetLastError
WriteProcessMemory
FreeConsole
TransactNamedPipe
GetFileAttributesW
MapViewOfFileEx
GetEnvironmentStringsA
lstrlenW
SignalObjectAndWait
SetComputerNameW
GetDevicePowerState
CreateSemaphoreA
SetThreadAffinityMask
OpenMutexA
FindResourceW
GetEnvironmentStringsW
DeleteVolumeMountPointW
CreateDirectoryExW
CreateIoCompletionPort
VirtualProtect
GetSystemWindowsDirectoryA
GetEnvironmentVariableW
GetLocalTime
SetThreadContext
user32
CharNextA
LoadCursorFromFileW
AnimateWindow
IsHungAppWindow
CharUpperBuffW
ChangeDisplaySettingsA
wsprintfA
CreatePopupMenu
IsCharAlphaW
GetParent
TrackPopupMenu
CreateWindowStationA
GetMenuDefaultItem
DrawEdge
SendDlgItemMessageW
GetWindowInfo
DdeCreateStringHandleA
IsRectEmpty
SetWindowsHookW
GetMenuStringA
ToUnicode
GetCapture
DrawIconEx
GetKeyNameTextW
IsWindowVisible
GetMonitorInfoA
LoadMenuW
DefFrameProcA
SetWindowsHookExA
EqualRect
EnumThreadWindows
DlgDirListComboBoxW
GetCaretPos
SwitchToThisWindow
DdeUninitialize
SetDlgItemTextW
SetWindowTextA
DlgDirSelectComboBoxExA
SendMessageCallbackW
DdeConnect
CheckMenuRadioItem
GetWindowRect
CheckRadioButton
GetAncestor
GetNextDlgTabItem
ShowScrollBar
CharToOemBuffW
UpdateWindow
DlgDirSelectExW
MessageBeep
LoadCursorA
GetComboBoxInfo
OpenWindowStationW
CharPrevExA
BroadcastSystemMessageA
GetKeyboardLayoutNameA
CharLowerA
DefWindowProcW
IsDialogMessageA
GetKeyNameTextA
PostThreadMessageA
RemovePropW
GetMenuItemInfoA
EndMenu
SetTimer
DefDlgProcW
FreeDDElParam
SetWindowRgn
SetRectEmpty
ToAsciiEx
MoveWindow
GetAsyncKeyState
GetTopWindow
SetWindowPos
PackDDElParam
DdeDisconnectList
WindowFromDC
LoadImageW
DdeAbandonTransaction
GrayStringA
SetActiveWindow
TranslateAcceleratorW
GetMenuItemInfoW
OpenWindowStationA
EnumDisplayMonitors
IsWindow
CreateDialogParamA
GetWindowThreadProcessId
GetPropA
wsprintfW
DdeClientTransaction
CascadeChildWindows
GetWindowTextW
GetKBCodePage
GetMenuCheckMarkDimensions
GetWindowLongA
gdi32
OffsetViewportOrgEx
SetViewportExtEx
GetStretchBltMode
SetLayoutWidth
GetCharWidthW
GdiFlush
GetMetaFileA
GdiDllInitialize
GetGlyphOutline
CreateEllipticRgnIndirect
PtVisible
GetClipBox
SetBoundsRect
GetEnhMetaFileBits
SetPolyFillMode
GdiEntry4
EngFindResource
SetMetaFileBitsEx
EngCreateDeviceBitmap
GdiEntry14
GetRegionData
GetMetaFileW
CreateEnhMetaFileA
EngDeletePalette
AddFontResourceExA
GetNearestPaletteIndex
StrokeAndFillPath
SetPixelFormat
CreatePolygonRgn
XFORMOBJ_bApplyXform
CreateRoundRectRgn
GdiEntry5
GdiGetSpoolMessage
GdiEndPageEMF
GdiConsoleTextOut
GetArcDirection
EndDoc
ExtCreatePen
GdiEntry6
PATHOBJ_vEnumStartClipLines
RemoveFontResourceExA
EqualRgn
GdiProcessSetup
CreateScalableFontResourceW
cGetTTFFromFOT
GetCharWidthInfo
PathToRegion
Polygon
GdiCleanCacheDC
PolyPolyline
LPtoDP
SetMagicColors
GdiCreateLocalEnhMetaFile
GetEUDCTimeStampExW
CreateCompatibleBitmap
CLIPOBJ_ppoGetPath
GetPath
SaveDC
FrameRgn
ResetDCA
GdiDeleteLocalDC
GdiGetPageHandle
ExtFloodFill
GetBkColor
EngComputeGlyphSet
GetTextExtentExPointWPri
GetPolyFillMode
GdiGetCodePage
GdiValidateHandle
GetOutlineTextMetricsW
CreateBrushIndirect
GetStringBitmapA
CopyEnhMetaFileA
CancelDC
EngStretchBltROP
EngCheckAbort
IntersectClipRect
GetTextMetricsA
GdiStartDocEMF
CreateEnhMetaFileW
GdiEntry8
GetAspectRatioFilterEx
GetTextExtentPointI
PlgBlt
SetBitmapDimensionEx
PolylineTo
FlattenPath
GetWinMetaFileBits
DeviceCapabilitiesExA
GdiConvertEnhMetaFile
GetColorAdjustment
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text4 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text3 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text2 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ