e:\udkk\uokkosh
Static task
static1
Behavioral task
behavioral1
Sample
3df85270c0f7e4f5376f73225d13c3f8_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3df85270c0f7e4f5376f73225d13c3f8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3df85270c0f7e4f5376f73225d13c3f8_JaffaCakes118
-
Size
320KB
-
MD5
3df85270c0f7e4f5376f73225d13c3f8
-
SHA1
1749aeef5dda999471b4b2dbef1a4dc8ebaf8185
-
SHA256
678dce780cdb3439edd216aba02d1e552956f9134182c61972a9026782f398f7
-
SHA512
8dc183934fc72ae1b078d4e7ea4c1259e6aa2f501c5579e4bac6f7a9e60750c363ef718cee125649ee190bebb5428a182d36482bd36445b26a65b0937b87c2a1
-
SSDEEP
6144:Rl8bcNcJnaRvrIClz3yZuqs+mbTeEkhR:r8ANcJaRI6yZuVBb6fh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3df85270c0f7e4f5376f73225d13c3f8_JaffaCakes118
Files
-
3df85270c0f7e4f5376f73225d13c3f8_JaffaCakes118.exe windows:4 windows x86 arch:x86
afd97166198117477ef125dc1bd7fba2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
ExtractAssociatedIconExW
SHGetPathFromIDList
wininet
InternetErrorDlg
InternetSetDialStateA
FreeUrlCacheSpaceA
InternetGetConnectedStateExA
FtpDeleteFileW
SetUrlCacheEntryInfoW
ReadUrlCacheEntryStream
CommitUrlCacheEntryW
CreateUrlCacheContainerA
user32
GetProcessWindowStation
GetClassInfoA
FindWindowW
GetWindowDC
DestroyWindow
RegisterDeviceNotificationA
SetRect
AdjustWindowRect
RegisterClassExA
UnregisterDeviceNotification
ShowWindow
EnumDisplaySettingsExW
TileWindows
PeekMessageA
DestroyAcceleratorTable
CopyAcceleratorTableA
DlgDirListW
GetDlgItem
CharPrevExA
CallMsgFilter
IsIconic
EndPaint
GetKBCodePage
MapVirtualKeyA
DeferWindowPos
DdeFreeDataHandle
PeekMessageW
RegisterWindowMessageW
ChangeClipboardChain
GetNextDlgGroupItem
GetCapture
SetMenuItemInfoA
GetIconInfo
GetScrollInfo
GetKeyboardLayoutNameA
CharNextA
DialogBoxIndirectParamW
OpenDesktopA
SetDeskWallpaper
CreateWindowExW
DdeConnect
CopyImage
AdjustWindowRectEx
IsWindowVisible
MessageBoxA
LoadKeyboardLayoutW
GetTitleBarInfo
SendNotifyMessageA
SwitchToThisWindow
FindWindowExA
TrackMouseEvent
EndTask
SetPropA
MessageBoxW
RegisterClassA
CreateDialogIndirectParamA
DlgDirSelectComboBoxExW
CreateAcceleratorTableW
GetNextDlgTabItem
DefWindowProcA
SetForegroundWindow
InsertMenuItemA
kernel32
VirtualFree
LCMapStringA
lstrcpy
CreateFileA
ExitProcess
SetLastError
SetCurrentDirectoryA
VirtualAlloc
LocalSize
GetCurrentThread
GetCurrentProcess
FindFirstFileA
ReadConsoleOutputAttribute
HeapSize
FileTimeToDosDateTime
ReadConsoleOutputW
ReleaseMutex
GetCurrentThreadId
GetStdHandle
ReadConsoleInputW
GetCurrentProcessId
IsValidCodePage
GetConsoleTitleA
GetThreadLocale
SetEnvironmentVariableW
GetModuleFileNameA
FreeLibrary
GetSystemInfo
GetLocaleInfoA
CloseHandle
LoadLibraryExW
InitializeCriticalSection
GetFileType
TerminateProcess
SetHandleCount
SetFileTime
IsBadWritePtr
HeapReAlloc
LocalShrink
OpenEventA
SetUnhandledExceptionFilter
GetTickCount
SetConsoleScreenBufferSize
LocalAlloc
HeapCreate
EnterCriticalSection
EnumSystemLocalesA
GetStringTypeW
TlsSetValue
SetStdHandle
GetDateFormatA
AddAtomA
GetTimeZoneInformation
ReadConsoleOutputCharacterW
FlushViewOfFile
VirtualProtect
GetLongPathNameW
GetConsoleOutputCP
ReadFile
FreeEnvironmentStringsA
GlobalLock
SetConsoleCtrlHandler
LeaveCriticalSection
WriteFile
Sleep
VirtualQuery
GetOEMCP
CreateDirectoryA
OpenMutexA
GetProcessHeap
GetShortPathNameW
WriteConsoleW
SetFileAttributesA
GetEnvironmentStringsW
GetVersionExA
ReadConsoleOutputCharacterA
GetConsoleMode
GlobalUnlock
LCMapStringW
CompareStringW
GetComputerNameA
SetEndOfFile
HeapAlloc
GetCurrencyFormatW
CreateMutexA
FlushFileBuffers
UnhandledExceptionFilter
GetSystemTimeAsFileTime
CreateProcessA
IsDebuggerPresent
GetDateFormatW
OpenSemaphoreA
EnumSystemLocalesW
GetDiskFreeSpaceExA
SetEnvironmentVariableA
LocalFileTimeToFileTime
FoldStringA
LoadLibraryA
GetACP
GetCurrentDirectoryW
GetProcAddress
SetConsoleCP
CreateEventW
CreateRemoteThread
GetCommandLineA
InterlockedIncrement
TransactNamedPipe
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
QueryPerformanceCounter
IsValidLocale
SetFilePointer
GetStringTypeA
InterlockedExchangeAdd
InterlockedDecrement
DeleteCriticalSection
RtlZeroMemory
GlobalReAlloc
MultiByteToWideChar
CompareStringA
HeapFree
LoadResource
GetProfileStringW
TlsFree
GetExitCodeProcess
GetConsoleCP
GetSystemDirectoryA
DuplicateHandle
GetModuleHandleA
SleepEx
GetEnvironmentStrings
GetLocaleInfoW
GetUserDefaultLCID
RemoveDirectoryW
HeapDestroy
TlsGetValue
GetTimeFormatA
GetCPInfo
RtlUnwind
InterlockedExchange
CreateWaitableTimerA
TlsAlloc
WriteConsoleA
GetStartupInfoA
gdi32
DeleteMetaFile
AnimatePalette
CopyEnhMetaFileA
SetTextCharacterExtra
StartPage
EnumFontsW
SetEnhMetaFileBits
CreatePalette
UpdateColors
GetObjectA
SetBrushOrgEx
UnrealizeObject
PtInRegion
GetTextExtentExPointA
SetDIBColorTable
comctl32
ImageList_Copy
ImageList_DragLeave
ImageList_EndDrag
ImageList_Write
ImageList_DrawIndirect
ImageList_SetFilter
CreatePropertySheetPage
CreateToolbarEx
ImageList_AddMasked
DrawStatusText
ImageList_SetImageCount
InitCommonControlsEx
ImageList_ReplaceIcon
ImageList_LoadImageA
ImageList_Read
ImageList_GetImageInfo
ImageList_GetDragImage
ImageList_SetBkColor
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ