Static task
static1
Behavioral task
behavioral1
Sample
3b535a4ecad93dc063fd07b2ae6e58a9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3b535a4ecad93dc063fd07b2ae6e58a9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3b535a4ecad93dc063fd07b2ae6e58a9_JaffaCakes118
-
Size
1.4MB
-
MD5
3b535a4ecad93dc063fd07b2ae6e58a9
-
SHA1
f1f1c5ab31ae713bab286da6d6f6eb4b1c932249
-
SHA256
426cf52c2175ff723d9b41fa9e4fbc73c035a3458be12863111c8b162dda8fdd
-
SHA512
6eb57ca55dfa8d2265185316b0aaffab57389fcf920e47b80e6fea4cc7c098b16a4505a57ab48401960197e5da0c7e6bba8bc343a0669fcaa43db6a3ab428bdf
-
SSDEEP
24576:0/xfGMJZjFY3k0XM8xvPbndMM7oOG5dSu52kEp3W8AD/Dhd+y4lqJ8QdCYDoDNQ:05frJVC3k0c8lsOGTasvD/DX+y4onCYP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b535a4ecad93dc063fd07b2ae6e58a9_JaffaCakes118
Files
-
3b535a4ecad93dc063fd07b2ae6e58a9_JaffaCakes118.exe windows:5 windows x86 arch:x86
eb0633d441c1707ffe5c206c8a04cdfc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
mciSendCommandA
mciGetErrorStringA
kernel32
SetEndOfFile
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
SetErrorMode
GetFileSizeEx
GetTickCount
RtlUnwind
HeapFree
HeapAlloc
GetCommandLineA
GetStartupInfoA
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
ExitProcess
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
UnlockFile
VirtualFree
GetStdHandle
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
LockFile
FlushFileBuffers
GetCurrentDirectoryA
WritePrivateProfileStringA
GetModuleHandleW
GetOEMCP
GetCPInfo
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
GlobalFlags
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameW
GetThreadLocale
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
GetCurrentProcessId
FormatMessageA
MulDiv
lstrlenA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
LoadLibraryA
SetLastError
MultiByteToWideChar
FreeLibrary
lstrcmpW
GetModuleHandleA
GetProcAddress
FreeResource
FindFirstFileA
GetFileAttributesA
FindNextFileA
FindClose
GetShortPathNameA
CreateThread
SetThreadPriority
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
WriteFile
ReadFile
SetFilePointer
GetFileSize
GetLastError
CreateFileA
GetFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
OpenFile
_lclose
GlobalReAlloc
_llseek
LocalAlloc
LocalFree
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
_lread
GetCurrentProcess
CloseHandle
RemoveDirectoryA
GetComputerNameA
Sleep
SetFileAttributesA
WinExec
GetModuleFileNameA
CopyFileA
DeleteFileA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
CreateDirectoryA
SetCurrentDirectoryA
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
GetSystemDefaultLCID
GetLocalTime
GetLogicalDriveStringsA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVersion
GetVersionExA
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
FindResourceA
HeapCreate
user32
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
IsRectEmpty
CopyAcceleratorTableA
CharUpperA
ReleaseCapture
SetCapture
LoadCursorA
GetSysColorBrush
DestroyMenu
CharNextA
SetWindowContextHelpId
MapDialogRect
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
GetWindowThreadProcessId
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
CheckRadioButton
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
UnregisterClassA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
PtInRect
GetMenu
PostThreadMessageA
RegisterClipboardFormatA
SetWindowPos
OffsetRect
IntersectRect
SendDlgItemMessageA
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
SetRect
DestroyIcon
ReleaseDC
ExitWindowsEx
GetSystemMetrics
SetWindowLongA
LoadIconA
KillTimer
SetTimer
InvalidateRect
GetDC
GetClientRect
GetWindowRect
IsIconic
DrawIcon
PostQuitMessage
GetParent
MessageBoxA
EnableWindow
SendMessageA
SetFocus
gdi32
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
TextOutA
PtVisible
CreatePen
CreateSolidBrush
CreateRectRgnIndirect
GetBkColor
GetTextColor
GetMapMode
GetRgnBox
RectVisible
SetMapMode
GetWindowExtEx
CreateICA
GetObjectA
CreateFontIndirectA
RestoreDC
SaveDC
SetTextColor
GetClipBox
GetTextExtentPoint32A
Rectangle
SetPixel
GetViewportExtEx
PatBlt
SetDIBitsToDevice
GetStockObject
CreatePalette
SetBkMode
SetBkColor
CreateBitmap
DeleteObject
SelectPalette
RealizePalette
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
AddFontResourceA
GetDeviceCaps
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
OpenProcessToken
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteValueA
RegDeleteKeyA
RegCloseKey
LookupPrivilegeValueA
AdjustTokenPrivileges
GetUserNameA
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyA
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetSpecialFolderPathA
SHGetSpecialFolderLocation
ShellExecuteA
SHGetMalloc
SHGetFileInfoA
comctl32
ord17
_TrackMouseEvent
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
oledlg
ord8
ole32
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CoRevokeClassObject
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
VariantClear
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
SysAllocStringByteLen
SysFreeString
SysStringLen
SysAllocStringLen
VariantInit
VariantChangeType
SysAllocString
Sections
.text Size: 432KB - Virtual size: 431KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ