Static task
static1
Behavioral task
behavioral1
Sample
3d534462fc353d71718e68d6bb342537_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3d534462fc353d71718e68d6bb342537_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3d534462fc353d71718e68d6bb342537_JaffaCakes118
-
Size
1.5MB
-
MD5
3d534462fc353d71718e68d6bb342537
-
SHA1
4d0cf8c60c5062b00b2c3f77342a10af045e8977
-
SHA256
124510e794c3face16fe64c99c82197360efbdbeedf02175d7387f05538204e4
-
SHA512
fe605de3e0e2b167d906dc8f97e059167750d9c8c4c9a18f5c4d3526ab1da0722bd222fd128b1b71e9ea5fb5df195611a8437c1962bccbb48f006373a447f44f
-
SSDEEP
24576:a8YjYFUeSmhdyQsYWTj7Yj0bisjonFHTaXcbBRTGqnGdZT9UMk7:cjYaeSmfyQaTjBxSzaXcbXKqGrTs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d534462fc353d71718e68d6bb342537_JaffaCakes118
Files
-
3d534462fc353d71718e68d6bb342537_JaffaCakes118.exe windows:4 windows x86 arch:x86
b2adfd16eede7dd884abf1882f7d9d3a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFlags
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
SetErrorMode
GetFileAttributesW
GetFileTime
FindNextFileW
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapReAlloc
RtlUnwind
RaiseException
ExitThread
SetStdHandle
GetFileType
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
LocalAlloc
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameW
GetVolumeInformationW
FindFirstFileW
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetThreadLocale
SuspendThread
WritePrivateProfileStringW
ConvertDefaultLocale
EnumResourceLanguagesW
GetLocaleInfoW
CompareStringA
GetCurrentProcessId
FormatMessageW
LocalFree
GlobalFree
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
FreeLibrary
CompareStringW
LoadLibraryA
GetVersionExA
MulDiv
SetEvent
GetTickCount
ResumeThread
SetThreadPriority
CreateEventW
lstrcmpiA
DeleteFileA
TerminateProcess
GetCurrentProcess
GetCurrentThread
GetVersionExW
WinExec
GetSystemDirectoryA
ReadFile
SetFilePointer
GetFileSize
GetModuleFileNameW
GetVersion
InterlockedDecrement
Sleep
GetLocalTime
FindClose
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InterlockedExchange
InterlockedIncrement
InitializeCriticalSection
OpenProcess
lstrcmpW
lstrcpyW
FindResourceW
FreeResource
TerminateThread
CreateThread
CreateFileW
DeleteFileW
GlobalUnlock
GlobalLock
GetTempPathW
GlobalAlloc
GetModuleHandleA
lstrcmpA
lstrcatA
GetModuleFileNameA
WaitForSingleObject
CreateMutexW
LockResource
ExitProcess
LoadResource
SizeofResource
FindResourceA
CopyFileA
lstrcpyA
CreateDirectoryA
CloseHandle
WriteFile
CreateFileA
LoadLibraryW
GetLastError
SetLastError
GetDriveTypeA
FindNextFileA
FindFirstFileA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetLogicalDrives
GetVolumeInformationA
GetProcAddress
GetModuleHandleW
WideCharToMultiByte
lstrlenW
lstrcatW
MultiByteToWideChar
VirtualQuery
lstrlenA
user32
ReleaseCapture
SetCapture
UnregisterClassW
GetSysColorBrush
WindowFromPoint
CharUpperW
GetMessageW
TranslateMessage
ValidateRect
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
DestroyMenu
GetWindowThreadProcessId
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
DispatchMessageW
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
GetKeyState
IsWindowVisible
GetMenu
GetMenuItemCount
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
EqualRect
RegisterClipboardFormatW
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
GetWindowLongW
SetWindowLongW
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
ScreenToClient
GrayStringW
DrawTextExW
DrawTextW
MessageBeep
TabbedTextOutW
DrawFocusRect
GetNextDlgGroupItem
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableW
RemovePropW
CharNextW
GetFocus
CopyRect
SetCursor
ReleaseDC
GetDC
LoadCursorW
InvalidateRect
GetParent
PostMessageW
TrackPopupMenu
GetCursorPos
SetMenuDefaultItem
GetSubMenu
LoadMenuW
KillTimer
RedrawWindow
SetParent
IsWindow
GetMenuItemID
SetForegroundWindow
PostThreadMessageW
UpdateWindow
GetSysColor
LoadIconA
SetFocus
SetActiveWindow
GetActiveWindow
IsWindowEnabled
GetDesktopWindow
CreatePopupMenu
GetWindowRect
AppendMenuW
wsprintfW
DrawIcon
LoadIconW
GetClientRect
GetSystemMetrics
EnableWindow
SendMessageW
RegisterWindowMessageW
IsIconic
MapWindowPoints
UnregisterClassA
gdi32
GetWindowExtEx
GetDeviceCaps
CreateBitmap
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetViewportExtEx
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
CreateRectRgnIndirect
GetObjectW
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateDIBSection
DeleteObject
DeleteDC
CreateCompatibleBitmap
GetTextExtentPoint32W
CreateSolidBrush
GetStockObject
GetCurrentObject
CreateFontIndirectW
CreateFontW
BitBlt
SelectObject
CreateCompatibleDC
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
RegQueryValueExW
RegOpenKeyExW
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyW
RegSetValueExA
RegDeleteValueW
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
OpenThreadToken
RegEnumValueA
RegOpenKeyA
RegSetValueExW
RegCreateKeyW
RegQueryValueExA
shell32
ShellExecuteW
SHGetSpecialFolderPathW
Shell_NotifyIconW
SHGetSpecialFolderPathA
ShellExecuteA
comctl32
InitCommonControlsEx
_TrackMouseEvent
shlwapi
PathFindFileNameW
PathStripToRootW
PathIsUNCW
PathFindExtensionW
UrlUnescapeW
ole32
CLSIDFromProgID
CoRegisterMessageFilter
CoInitialize
CoCreateInstance
CreateStreamOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
oleaut32
OleCreateFontIndirect
SafeArrayDestroy
VariantCopy
VariantInit
VariantChangeType
SysAllocStringByteLen
SysStringLen
SysAllocString
SysFreeString
SystemTimeToVariantTime
VariantTimeToSystemTime
SysAllocStringLen
VariantClear
oledlg
OleUIBusyW
gdiplus
GdipFree
GdipCreateHBITMAPFromBitmap
GdipDisposeImage
GdipAlloc
GdiplusShutdown
GdiplusStartup
GdipCloneImage
GdipCreateBitmapFromStream
psapi
GetModuleFileNameExA
GetModuleFileNameExW
EnumProcessModules
EnumProcesses
wininet
InternetOpenUrlW
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetOpenW
InternetGetLastResponseInfoW
InternetCloseHandle
HttpQueryInfoW
InternetQueryDataAvailable
InternetQueryOptionW
InternetCanonicalizeUrlW
InternetCrackUrlW
InternetGetConnectedState
Sections
.text Size: 476KB - Virtual size: 475KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 271KB - Virtual size: 270KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 46KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 747KB - Virtual size: 747KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ