Static task
static1
Behavioral task
behavioral1
Sample
35dfadda2b1bc15ad4ea9f8e22f5be39_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
35dfadda2b1bc15ad4ea9f8e22f5be39_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
35dfadda2b1bc15ad4ea9f8e22f5be39_JaffaCakes118
-
Size
187KB
-
MD5
35dfadda2b1bc15ad4ea9f8e22f5be39
-
SHA1
fd2eda3478132d0d6d65ebb8a40d7676a8beb027
-
SHA256
80793433ee69d3644af939a52df7f269ee2514a06485c16159e693d8e50f1c3b
-
SHA512
e397735d87d52b01ed909bfa8b88254af20c5d1387105345ac6ebee6740d83188d4717040e56095bfbb3fefd4111ce6b80e750602ad41763b4ae6381ea091ddc
-
SSDEEP
3072:Idn6W7jxOPV+L6tOgPKogKvElXW0ZbOWI8KD97b7Z2US4h5PC:ojxSV+LQjK9LOyKD9fZ2Kz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 35dfadda2b1bc15ad4ea9f8e22f5be39_JaffaCakes118
Files
-
35dfadda2b1bc15ad4ea9f8e22f5be39_JaffaCakes118.exe windows:5 windows x86 arch:x86
be1b1de343dafee774bda42b366d9ce8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
kernel32
GetModuleHandleA
Sleep
Process32Next
TerminateProcess
OpenProcess
CloseHandle
Process32First
CreateToolhelp32Snapshot
GetVersionExA
CreateThread
GetProcAddress
ExitProcess
GetCurrentProcessId
WriteProcessMemory
CreateProcessA
GetEnvironmentVariableW
LocalFree
LocalAlloc
WaitForSingleObject
CreateEventA
SetUnhandledExceptionFilter
DeleteFileA
GetSystemDirectoryA
CreateProcessW
CreateFileW
WriteFile
CreateFileA
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
LoadLibraryExA
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
LoadResource
HeapCreate
HeapSize
HeapReAlloc
GetStartupInfoA
GetCommandLineA
IsDebuggerPresent
UnhandledExceptionFilter
RtlUnwind
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualProtect
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
GetCPInfo
FindResourceA
SizeofResource
FreeLibrary
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
GlobalAlloc
GlobalLock
GlobalUnlock
GetModuleFileNameA
MulDiv
GetEnvironmentStringsW
lstrcmpA
IsDBCSLeadByte
lstrcmpiA
lstrlenA
InterlockedDecrement
InterlockedIncrement
GetLastError
lstrlenW
WideCharToMultiByte
DeleteCriticalSection
InitializeCriticalSection
MultiByteToWideChar
SetLastError
GetCurrentThreadId
GetTickCount
GetCurrentProcess
FlushInstructionCache
LeaveCriticalSection
EnterCriticalSection
RaiseException
SetHandleCount
user32
GetMenuItemCount
AppendMenuA
DestroyMenu
CreatePopupMenu
DefFrameProcA
LoadStringW
PostQuitMessage
SetMenuDefaultItem
GetMenuItemInfoA
SetMenuItemInfoA
SystemParametersInfoA
GetScrollInfo
SetScrollPos
ScrollWindowEx
UpdateWindow
TranslateMDISysAccel
wsprintfA
RemoveMenu
GetProcessWindowStation
GetUserObjectInformationA
CloseWindowStation
GetWindowRect
MapWindowPoints
FindWindowExW
SetScrollInfo
KillTimer
RegisterWindowMessageA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
GetMonitorInfoA
MonitorFromPoint
TrackPopupMenuEx
UnregisterClassA
PtInRect
GetSubMenu
GetMenuStringA
DrawMenuBar
IsWindowVisible
DefMDIChildProcA
LoadStringA
LoadMenuA
LoadAcceleratorsA
CreateAcceleratorTableA
AdjustWindowRectEx
FindWindowA
IsWindow
SendMessageA
GetDesktopWindow
GetFocus
GetWindow
SetFocus
DestroyAcceleratorTable
BeginPaint
EndPaint
CallWindowProcA
FillRect
ReleaseCapture
GetClassNameA
GetDlgItem
GetParent
IsChild
SetCapture
RedrawWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
ScreenToClient
ClientToScreen
GetClientRect
SetWindowPos
MoveWindow
GetSysColor
LoadImageA
DestroyWindow
CharNextA
DefWindowProcA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
ShowWindow
GetWindowLongA
CreateWindowExA
RegisterClassExA
TranslateAcceleratorA
LoadCursorA
GetClassInfoExA
SetTimer
PostMessageA
SetWindowLongA
BringWindowToTop
MessageBeep
gdi32
SetViewportOrgEx
GetStockObject
GetObjectA
CreateSolidBrush
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteObject
DeleteDC
advapi32
RegOpenKeyExA
RegEnumKeyExA
QueryServiceConfigA
CreateProcessAsUserA
OpenProcessToken
RegOpenKeyA
RegQueryValueExA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
RegQueryInfoKeyA
RegSetValueExA
QueryServiceStatusEx
ole32
OleInitialize
OleUninitialize
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoUninitialize
CoInitialize
CreateStreamOnHGlobal
oleaut32
SysStringLen
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
VariantClear
VariantInit
VarUI4FromStr
SysAllocString
SysAllocStringLen
SysFreeString
comctl32
InitCommonControlsEx
iphlpapi
GetAdaptersInfo
psapi
GetProcessMemoryInfo
wininet
HttpQueryInfoA
InternetConnectA
InternetSetOptionA
HttpSendRequestA
InternetOpenA
InternetReadFile
HttpOpenRequestA
InternetCloseHandle
Sections
.text Size: 135KB - Virtual size: 135KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ