Static task
static1
Behavioral task
behavioral1
Sample
3770c4c0480ca8289d9ff51d427a764f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3770c4c0480ca8289d9ff51d427a764f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3770c4c0480ca8289d9ff51d427a764f_JaffaCakes118
-
Size
324KB
-
MD5
3770c4c0480ca8289d9ff51d427a764f
-
SHA1
e6e14bb5e8bc656e8e4b0f41e6edc60e693dd4a4
-
SHA256
d1fff5d6280e4b9e6cebd9bf6938e9baa196bc63f3415d1fbaff86dd3ae04b4b
-
SHA512
787c88503c26b6fe8b5f9694c0e280182885e61916f35b674aaec0a4cfc73b29d93122161cfa8c481a89bee13c0842e3a1bb133c2d62fac762a2d1d87a2b5984
-
SSDEEP
6144:BD/HsVX4DZX1bYCG3p0il0uhgyHCYpaJv+TnvxGkKQ9apZZTSCDTFE:RHsVX4DEX5GJyNEe8kKQwY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3770c4c0480ca8289d9ff51d427a764f_JaffaCakes118
Files
-
3770c4c0480ca8289d9ff51d427a764f_JaffaCakes118.exe windows:4 windows x86 arch:x86
29acb94783c8077673ba1da33825f8c5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetStartupInfoA
GetStartupInfoW
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDefaultLangID
GetSystemInfo
GetSystemTimeAsFileTime
GetThreadLocale
GetTickCount
GetTimeZoneInformation
GetVersion
GetVersionExA
GlobalAddAtomW
GlobalAlloc
GlobalFindAtomW
GlobalFlags
GlobalFree
GlobalLock
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
IsDebuggerPresent
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LoadResource
GetProcAddress
LocalFree
LocalReAlloc
LockFile
LockResource
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReadFile
RtlUnwind
SetEndOfFile
SetEnvironmentVariableA
SetHandleCount
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnlockFile
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
WritePrivateProfileStringW
lstrcmpA
lstrcmpW
lstrlenA
lstrlenW
GetModuleHandleW
GetModuleFileNameW
GetModuleFileNameA
GetLocaleInfoW
GetLocaleInfoA
GetLastError
GetFullPathNameW
GetFileType
GetFileTime
GetFileSize
GetFileAttributesW
GetEnvironmentStringsW
GetEnvironmentStringsA
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetConsoleOutputCP
GetConsoleMode
GetConsoleCP
GetCommandLineW
GetCommandLineA
GetCPInfo
GetACP
FreeResource
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FormatMessageW
FlushFileBuffers
FindResourceW
FindResourceExW
FindFirstFileW
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
ExitProcess
EnumResourceLanguagesW
EnterCriticalSection
DuplicateHandle
DeleteCriticalSection
CreateFileW
CreateFileA
CopyFileW
ConvertDefaultLocale
CompareStringW
CompareStringA
LocalAlloc
CloseHandle
user32
IsChild
IsDialogMessageW
IsIconic
IsWindow
IsWindowEnabled
IsWindowVisible
LoadBitmapW
LoadCursorW
LoadIconW
MapDialogRect
MapWindowPoints
MessageBeep
MessageBoxW
ModifyMenuW
MoveWindow
OffsetRect
PeekMessageW
PostMessageW
PostQuitMessage
PostThreadMessageW
PtInRect
RegisterClassW
RegisterClipboardFormatW
RegisterWindowMessageW
ReleaseCapture
ReleaseDC
RemovePropW
ScreenToClient
SendDlgItemMessageA
SendDlgItemMessageW
SendMessageW
SetActiveWindow
SetCapture
SetCursor
SetFocus
SetForegroundWindow
SetMenuItemBitmaps
SetPropW
SetRect
SetWindowContextHelpId
SetWindowLongW
SetWindowPos
SetWindowTextW
SetWindowsHookExW
ShowWindow
SystemParametersInfoA
TranslateMessage
UnhookWindowsHookEx
UnregisterClassA
UnregisterClassW
UpdateWindow
ValidateRect
WinHelpW
InvalidateRect
GetWindowDC
GetWindow
GetTopWindow
GetSystemMetrics
GetSystemMenu
GetSysColorBrush
GetSysColor
GetSubMenu
GetPropW
GetParent
GetNextDlgTabItem
GetNextDlgGroupItem
GetMessageW
GetMessageTime
GetMenuState
GetMenuItemID
GetMenuItemCount
GetMenuCheckMarkDimensions
GetMenu
GetLastActivePopup
GetKeyState
GetForegroundWindow
GetFocus
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDC
GetCursorPos
GetClientRect
GetClassNameW
GetClassLongW
GetClassInfoW
GetClassInfoExW
GetCapture
GetActiveWindow
AdjustWindowRectEx
BeginPaint
CallNextHookEx
CallWindowProcW
CharNextW
CharUpperW
EqualRect
EndPaint
EndDialog
EnableWindow
EnableMenuItem
DrawTextW
DrawTextExW
DrawIcon
DispatchMessageW
DestroyWindow
DestroyMenu
IntersectRect
GrayStringW
GetWindowThreadProcessId
DefWindowProcW
CreateWindowExW
GetWindowTextW
GetWindowTextLengthW
GetWindowRect
GetWindowLongW
GetWindowPlacement
CheckMenuItem
ClientToScreen
CopyAcceleratorTableW
CopyIcon
CopyRect
CreateDialogIndirectParamW
GetMessagePos
gdi32
SelectObject
SetBkColor
SetBkMode
SetMapMode
ScaleWindowExtEx
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
TextOutW
ScaleViewportExtEx
SaveDC
RestoreDC
RectVisible
PtVisible
OffsetViewportOrgEx
GetWindowExtEx
GetViewportExtEx
GetTextExtentPoint32W
GetTextColor
GetRgnBox
SetTextColor
CreateBitmap
GetObjectW
GetMapMode
GetDeviceCaps
GetClipBox
GetBkColor
ExtTextOutW
ExtSelectClipRgn
Escape
DeleteObject
DeleteDC
CreateRectRgnIndirect
CreateFontW
GetStockObject
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegOpenKeyExW
RegSetValueExW
RegQueryValueW
RegQueryValueExW
RegOpenKeyW
RegCloseKey
RegOpenCurrentUser
RegEnumKeyW
RegDeleteKeyW
RegCreateKeyExW
shell32
ShellExecuteW
ExtractIconW
comctl32
ord17
shlwapi
PathFindExtensionW
PathFindFileNameW
PathIsUNCW
PathStripToRootW
oledlg
OleUIBusyW
ole32
OleInitialize
OleIsCurrentClipboard
OleUninitialize
StgCreateDocfileOnILockBytes
CoUninitialize
CoFreeUnusedLibraries
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoRevokeClassObject
CoRegisterMessageFilter
CoInitialize
StgOpenStorageOnILockBytes
CoGetClassObject
oleaut32
OleCreateFontIndirect
SafeArrayDestroy
SysAllocString
SysAllocStringLen
SysFreeString
SysStringLen
SystemTimeToVariantTime
VariantChangeType
VariantClear
VariantCopy
VariantInit
VariantTimeToSystemTime
Sections
.text Size: 253KB - Virtual size: 256KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ