Static task
static1
Behavioral task
behavioral1
Sample
3d0785d637cb7da3401fb242f9a7c5bd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3d0785d637cb7da3401fb242f9a7c5bd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3d0785d637cb7da3401fb242f9a7c5bd_JaffaCakes118
-
Size
1.2MB
-
MD5
3d0785d637cb7da3401fb242f9a7c5bd
-
SHA1
aa43a0e773dec6e8e56559e9d823a3253675b762
-
SHA256
e7f1ef85d93fcc26a73870439e8548357cf63a9ec52fef080b298c5fd9f73d38
-
SHA512
551efbfff020444f87e23758e25ed170d982c0595bb0be4093415578b1fb8f7bb21dca702abedf5b4088e416d79dc39ee15b3ab4dff613677cc74c0cf6dbb662
-
SSDEEP
24576:BLRccau0K9VEMa3y4tBQvz46ryyA5uoyUlz0AxSo9:BmNOfE1y4tOvk6rG5Vyy99
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d0785d637cb7da3401fb242f9a7c5bd_JaffaCakes118
Files
-
3d0785d637cb7da3401fb242f9a7c5bd_JaffaCakes118.exe windows:4 windows x86 arch:x86
1d7a96a8343bed9223f3902c680fe19e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSAAccept
WSARecvFrom
WSASocketA
gethostbyname
setsockopt
recv
__WSAFDIsSet
select
closesocket
sendto
htons
socket
ntohs
send
recvfrom
WSAGetLastError
WSAAddressToStringA
getsockname
accept
listen
WSAConnect
bind
ntohl
inet_addr
htonl
inet_ntoa
WSASendTo
WSAStartup
connect
kernel32
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
FindResourceExA
GetCurrentDirectoryA
SetFilePointer
LockFile
UnlockFile
SetEndOfFile
GetVolumeInformationA
GetFullPathNameA
GetFileAttributesA
GetFileTime
LocalReAlloc
SetErrorMode
RtlUnwind
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
HeapAlloc
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
HeapSize
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetTimeZoneInformation
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
GetStringTypeA
GetStringTypeW
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
GlobalFlags
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
FileTimeToLocalFileTime
VirtualProtect
SetLastError
MulDiv
FormatMessageA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalDeleteAtom
lstrcmpW
lstrcpynA
GetModuleHandleA
FreeResource
GlobalAlloc
GlobalLock
GlobalUnlock
GetFileSize
CompareStringA
CompareStringW
MultiByteToWideChar
GetVersion
CreateNamedPipeA
ConnectNamedPipe
FlushFileBuffers
DisconnectNamedPipe
CreateFileA
ResetEvent
FileTimeToSystemTime
MapViewOfFile
GetCurrentProcessId
DuplicateHandle
DeviceIoControl
UnmapViewOfFile
GetProcessHeap
HeapFree
OpenProcess
TerminateProcess
lstrcmpiA
LocalAlloc
GlobalFree
LocalFree
GetPrivateProfileIntA
LeaveCriticalSection
CreateDirectoryA
SetEvent
CreateEventA
WaitForSingleObject
GetProcAddress
FindFirstFileA
FindNextFileA
FindClose
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
TerminateThread
CreateThread
WinExec
GetCurrentProcess
GetTickCount
GlobalFindAtomA
GlobalAddAtomA
RaiseException
DeleteCriticalSection
InitializeCriticalSection
WriteFile
ReadFile
lstrcpyA
lstrcatA
CreateMutexA
GetLastError
CloseHandle
Sleep
GetComputerNameA
lstrlenA
GetSystemTime
DeleteFileA
InterlockedDecrement
CopyFileA
WritePrivateProfileStringA
EnterCriticalSection
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
FindResourceA
GetLocalTime
GetModuleFileNameA
GetPrivateProfileStringA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
user32
CharNextA
IsRectEmpty
SetRect
CopyAcceleratorTableA
InvalidateRgn
GetNextDlgGroupItem
RegisterClipboardFormatA
PostThreadMessageA
GetSysColorBrush
WindowFromPoint
DestroyMenu
SetWindowContextHelpId
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
MapDialogRect
GetAsyncKeyState
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMenuStringA
SetMenuItemBitmaps
GetMenuState
EnableMenuItem
GetMenuCheckMarkDimensions
ShowWindow
IsDialogMessageA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
TrackPopupMenu
IsWindowVisible
GetMenu
AdjustWindowRectEx
EqualRect
GetDlgCtrlID
CallWindowProcA
SetWindowPos
OffsetRect
IntersectRect
GetWindowPlacement
CopyRect
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
IsWindowEnabled
GetNextDlgTabItem
EndDialog
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
CharUpperA
LoadBitmapA
UpdateWindow
MsgWaitForMultipleObjects
KillTimer
MessageBoxA
FillRect
DefWindowProcA
RegisterClassA
SetCapture
RedrawWindow
ReleaseDC
GetDC
InflateRect
LoadCursorA
CopyIcon
GetSysColor
SetWindowLongA
SetCursor
ReleaseCapture
MessageBeep
LoadIconA
SetForegroundWindow
IsIconic
GetSystemMenu
LoadMenuA
ModifyMenuA
GetSubMenu
GetMenuItemID
GetMenuItemCount
CheckMenuItem
AppendMenuA
DrawIcon
ExitWindowsEx
SetWindowTextA
GetCursorPos
UnregisterHotKey
RegisterHotKey
GetSystemMetrics
LoadImageA
wsprintfA
UnregisterClassA
GetClassInfoA
FindWindowA
PostMessageA
SetTimer
InvalidateRect
PtInRect
LoadStringA
GetKeyState
MoveWindow
GetWindowRect
ScreenToClient
GetDlgItem
IsWindow
GetClientRect
EnableWindow
GetParent
GetWindow
SendMessageA
SystemParametersInfoA
gdi32
EnumFontFamiliesExA
GetBkColor
GetTextColor
GetRgnBox
ScaleWindowExtEx
SetWindowExtEx
GetMapMode
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateHatchBrush
CreatePen
DeleteDC
ExtSelectClipRgn
MoveToEx
LineTo
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateRectRgnIndirect
GetWindowExtEx
GetViewportExtEx
DeleteObject
GetDeviceCaps
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
BitBlt
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetTextExtentPoint32A
GetObjectA
CreateFontIndirectA
GetStockObject
comdlg32
GetSaveFileNameA
GetOpenFileNameA
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
QueryServiceStatus
StartServiceA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueA
CreateServiceA
DeleteService
ControlService
RegCreateKeyExA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegCloseKey
RegSetValueExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
EnumServicesStatusA
QueryServiceConfigA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
Shell_NotifyIconA
ShellExecuteA
comctl32
ord17
ImageList_Destroy
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
ImageList_Duplicate
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
oledlg
ord8
ole32
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoRegisterMessageFilter
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
CoCreateInstance
CLSIDFromString
CoUninitialize
oleaut32
SysStringLen
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SysFreeString
SysStringByteLen
SysAllocStringByteLen
SystemTimeToVariantTime
VariantTimeToSystemTime
OleCreateFontIndirect
SysAllocString
VariantCopy
SafeArrayDestroy
wininet
HttpAddRequestHeadersA
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetReadFile
HttpQueryInfoA
InternetCloseHandle
HttpSendRequestA
InternetOpenUrlA
InternetGetLastResponseInfoA
GetUrlCacheEntryInfoA
wsock32
WSACleanup
iphlpapi
GetIfTable
SendARP
Sections
.text Size: 596KB - Virtual size: 595KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 124KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 210KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 468KB - Virtual size: 465KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ