Static task
static1
Behavioral task
behavioral1
Sample
39a739477022318118685a5bf72ba81d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
39a739477022318118685a5bf72ba81d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
39a739477022318118685a5bf72ba81d_JaffaCakes118
-
Size
196KB
-
MD5
39a739477022318118685a5bf72ba81d
-
SHA1
6a19d87335e60b6ceb49f9a694e88396ffe69efd
-
SHA256
c6f95895beb8eaa274621debc0aad4e1d8dcc2a74ab1664d6249ae5d8ff8baf2
-
SHA512
1bea40825cee4102a943f0b5d57ff951b7204c16959399e93e57b320df1e1aa3393c93cb7909f37f7893da4ba006bea5690e6c60b6dd7c1e1f9e22b36ee2419a
-
SSDEEP
6144:MI1ndeZlsnFclxlT7tzYnj6AkJseDeeeeeeeeeeeeeee:MI1nulsFSlTxY+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39a739477022318118685a5bf72ba81d_JaffaCakes118
Files
-
39a739477022318118685a5bf72ba81d_JaffaCakes118.exe windows:4 windows x86 arch:x86
c3cd804777c341c878911d95ba915f39
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsAlloc
GlobalFree
GlobalHandle
GlobalReAlloc
GlobalAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GetProcessVersion
GlobalFlags
GetCPInfo
GetOEMCP
RtlUnwind
ExitProcess
GetStartupInfoA
GetCommandLineA
RaiseException
HeapAlloc
HeapFree
ExitThread
GetTimeZoneInformation
SetStdHandle
GetFileType
GetVersion
HeapSize
HeapReAlloc
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
VirtualAlloc
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
lstrcatA
GetFileTime
GetFileSize
lstrcmpA
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalLock
GlobalUnlock
IsBadReadPtr
IsBadWritePtr
SetLastError
CreateEventA
SuspendThread
GetCurrentThreadId
SetEvent
WaitForSingleObject
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FreeLibrary
EnterCriticalSection
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
lstrcpyA
LoadLibraryA
GetProcAddress
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
lstrcpynA
lstrcmpiA
InterlockedIncrement
ResumeThread
CreateThread
InterlockedDecrement
GetSystemDirectoryA
WritePrivateProfileStringA
OpenProcess
TerminateProcess
CloseHandle
CreateToolhelp32Snapshot
Process32First
Process32Next
MultiByteToWideChar
GetFileAttributesA
SetFileAttributesA
DeleteFileA
OpenFile
_lclose
SetThreadPriority
CreateProcessA
GetLastError
Sleep
GetPrivateProfileStringA
lstrlenW
WideCharToMultiByte
FormatMessageA
lstrlenA
LocalAlloc
GetModuleFileNameA
GetACP
LocalFree
user32
DestroyMenu
PostQuitMessage
ClientToScreen
PtInRect
GetClassNameA
GetDC
ReleaseDC
GetSysColorBrush
LoadCursorA
ShowWindow
SetWindowTextA
LoadIconA
PostMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
GetClientRect
CopyRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
wsprintfA
SendMessageA
FindWindowA
FindWindowExA
DispatchMessageA
GetMessageA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringA
DrawTextA
TabbedTextOutA
GetWindowRect
GetMenuCheckMarkDimensions
EnableWindow
MessageBoxA
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
CharUpperA
GetSystemMetrics
SetWindowsHookExA
GetCursorPos
PeekMessageA
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
UnhookWindowsHookEx
GetWindowTextA
LoadStringA
TranslateMessage
gdi32
RectVisible
TextOutA
ExtTextOutA
Escape
PtVisible
CreateBitmap
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
SetNamedSecurityInfoA
RegCreateKeyA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
RegQueryValueExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegOpenKeyA
RegOpenKeyExA
RegEnumValueA
RegCloseKey
shell32
SHGetMalloc
SHGetDataFromIDListA
SHGetDesktopFolder
comctl32
ord17
ole32
CoUninitialize
CoInitialize
CoCreateInstance
OleRun
oleaut32
VariantClear
SysAllocString
VariantCopy
VariantInit
SysFreeString
VariantChangeType
SysAllocStringLen
GetErrorInfo
wininet
InternetGetLastResponseInfoA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetReadFile
InternetQueryDataAvailable
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ