Static task
static1
Behavioral task
behavioral1
Sample
3ac90719b023036eeae50e2c53724b08_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3ac90719b023036eeae50e2c53724b08_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3ac90719b023036eeae50e2c53724b08_JaffaCakes118
-
Size
1.1MB
-
MD5
3ac90719b023036eeae50e2c53724b08
-
SHA1
6ca955045811b7a597842de520814d857947f4be
-
SHA256
f6c696ac57f9129a335d7792caf67bf1b1449a19d7805db4b7aff840cb00502c
-
SHA512
70652632df5bfacbeb1bdc0366e740ab6c1f8a7709c1d71eb6b602eb9631b49167bcbd583386b59466a0da416b46db6c404d7ef3b67f290cc524f58410bf3c39
-
SSDEEP
24576:wMWcNofvNgNgZ/McoZQoCm4fK1FuT6OCve5stUGF3mH5WLp2:5EdgzcqvL4fZWO8dmZWLp2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ac90719b023036eeae50e2c53724b08_JaffaCakes118
Files
-
3ac90719b023036eeae50e2c53724b08_JaffaCakes118.exe windows:4 windows x86 arch:x86
c534c10c7f71dbbddd826ef7416c606f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessVersion
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
TlsGetValue
SetErrorMode
RtlUnwind
RaiseException
ExitProcess
GetStartupInfoA
GetCommandLineA
TlsSetValue
LocalReAlloc
SetCurrentDirectoryA
HeapFree
SetStdHandle
GetFileType
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetACP
HeapReAlloc
HeapSize
SetEnvironmentVariableA
HeapAlloc
TlsFree
GlobalReAlloc
GlobalHandle
UnmapViewOfFile
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
VirtualFree
CompareStringA
CompareStringW
VirtualAlloc
IsBadWritePtr
IsBadReadPtr
IsBadCodePtr
GetWindowsDirectoryA
GetTempPathA
WriteFile
ReadFile
GetFileSize
CopyFileA
SetFilePointer
TlsAlloc
LocalAlloc
SizeofResource
GlobalFlags
MulDiv
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetFullPathNameA
GetVolumeInformationA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
DuplicateHandle
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileTime
lstrcpynA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindFirstFileA
FindClose
GlobalAlloc
lstrcmpA
GetCurrentThread
LocalFree
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
lstrcmpiA
GetDiskFreeSpaceA
lstrcpyA
GlobalFindAtomA
GlobalDeleteAtom
GetStringTypeA
GlobalUnlock
GetModuleFileNameA
GetModuleHandleA
GlobalLock
FindResourceA
GlobalFree
LockResource
InterlockedDecrement
LoadResource
MultiByteToWideChar
MapViewOfFile
InterlockedIncrement
CreateFileMappingA
GetStringTypeW
SetVolumeLabelA
GetProcAddress
GetDriveTypeA
CreateDirectoryA
GetFileAttributesA
GetCurrentProcess
SetLastError
WaitForSingleObject
GetPrivateProfileSectionA
WritePrivateProfileStringA
GetPrivateProfileStringA
lstrlenA
SetFileAttributesA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetSystemDirectoryA
OpenProcess
LoadLibraryA
GetVersionExA
FreeLibrary
CloseHandle
TerminateProcess
GetProfileStringA
WideCharToMultiByte
GetLastError
CreateSemaphoreA
DeleteFileA
CreateFileA
Sleep
user32
PostQuitMessage
SetCursor
ValidateRect
TranslateMessage
GetDC
GetMessageA
CharUpperA
GetClassNameA
PtInRect
ClientToScreen
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetSysColorBrush
DestroyMenu
InflateRect
GetMenuCheckMarkDimensions
ReleaseDC
InvalidateRect
GetSysColor
PeekMessageA
DispatchMessageA
GetFocus
SetFocus
AdjustWindowRectEx
ScreenToClient
GetClientRect
CopyRect
GetCapture
MapWindowPoints
wsprintfA
GetMenuState
LoadBitmapA
GetMenu
GetMenuItemCount
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetKeyState
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
LoadStringA
OemToCharA
PostMessageA
GetWindowThreadProcessId
GetCursorPos
WindowFromPoint
MessageBoxA
LoadIconA
IsWindow
IsWindowVisible
SetForegroundWindow
SetWindowTextA
IsDialogMessageA
UpdateWindow
SendDlgItemMessageA
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
ShowWindow
GetClassInfoA
RegisterClassA
GetTopWindow
WinHelpA
IsIconic
EnumWindows
EnableWindow
KillTimer
SetTimer
SendMessageA
GetSubMenu
GetDlgCtrlID
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
CharNextA
IsWindowUnicode
gdi32
GetClipBox
SetBkColor
GetObjectA
CreateBitmap
PatBlt
DeleteObject
SelectObject
GetDeviceCaps
GetStockObject
SaveDC
DeleteDC
SetBkMode
RestoreDC
SetViewportOrgEx
OffsetViewportOrgEx
SetMapMode
ScaleViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
IntersectClipRect
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CreateDIBitmap
CreateCompatibleDC
BitBlt
GetTextExtentPointA
SetTextColor
SetViewportExtEx
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
AdjustTokenPrivileges
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
shell32
Shell_NotifyIconA
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
comctl32
ord17
wsock32
WSAStartup
WSACleanup
Sections
.text Size: 160KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE