Static task
static1
Behavioral task
behavioral1
Sample
42d6fb4bebc77fe3b3d290dbd9b2afaf_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
42d6fb4bebc77fe3b3d290dbd9b2afaf_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
42d6fb4bebc77fe3b3d290dbd9b2afaf_JaffaCakes118
-
Size
965KB
-
MD5
42d6fb4bebc77fe3b3d290dbd9b2afaf
-
SHA1
0aa9e1c44f2c825a31284e23ee85c78d2ccba298
-
SHA256
5292c977019ddd3b74f19afbd1e3d3da989c284c48cb755ff48833a03f4e1fd1
-
SHA512
cac2373f0e13c099f61048551ffd8868e06b2315d5c1d073d48fe7505c610a4b391ca433995df5115ff54748b867d2ca9317880bd95f206aecc37a2b60fdb998
-
SSDEEP
24576:6Ji4hK5ESDzqLCsF9jJ+Jge6P4D4H6HXqWStOxY8W:9eK7zqmsDQq4D4axS4xh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42d6fb4bebc77fe3b3d290dbd9b2afaf_JaffaCakes118
Files
-
42d6fb4bebc77fe3b3d290dbd9b2afaf_JaffaCakes118.exe windows:5 windows x86 arch:x86
6dccf126c251917f04c5bc0ce7f20902
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleCP
BeginUpdateResourceA
TlsFree
GetFileType
CreateEventA
FindResourceA
GetCommandLineW
FileTimeToLocalFileTime
GetConsoleOutputCP
FindNextFileA
HeapAlloc
TlsGetValue
lstrcmpiA
WideCharToMultiByte
GetFileAttributesA
FreeEnvironmentStringsW
GetDateFormatA
FlushFileBuffers
ExitThread
QueryPerformanceCounter
EnterCriticalSection
ExitProcess
GetFullPathNameW
EnumResourceLanguagesA
DeleteCriticalSection
SetEnvironmentVariableA
GetStringTypeW
DeviceIoControl
SetCurrentDirectoryA
GetPriorityClass
ReadFile
TlsAlloc
GetCommandLineA
VirtualFree
GetProfileStringA
SetCurrentDirectoryW
InterlockedIncrement
LoadLibraryA
InitializeCriticalSectionAndSpinCount
IsDBCSLeadByte
UnmapViewOfFile
SetFileAttributesA
GetEnvironmentStrings
FormatMessageA
CompareStringW
GetStartupInfoA
GetThreadPriority
ExpandEnvironmentStringsA
SuspendThread
GetStdHandle
GetEnvironmentStringsW
TerminateProcess
GetModuleHandleW
GlobalSize
GetCurrentDirectoryW
GetCurrentThreadId
LCMapStringW
GetCurrentProcessId
GetPrivateProfileStringA
CreateDirectoryW
GetFullPathNameA
LocalFileTimeToFileTime
EndUpdateResourceA
MoveFileW
DeleteFileW
RemoveDirectoryW
GetDriveTypeA
WriteFile
WriteConsoleA
CreateThread
GetCurrentDirectoryA
GetCompressedFileSizeA
SetFileTime
LocalFree
CloseHandle
SetFileAttributesW
FindFirstFileA
RemoveDirectoryA
GetACP
GetOEMCP
ResetEvent
ResumeThread
CreateDirectoryA
SetStdHandle
GetLocalTime
LoadResource
GetVersionExA
GlobalMemoryStatus
BackupSeek
GetLogicalDriveStringsA
FindClose
UnhandledExceptionFilter
FindFirstChangeNotificationA
GetCurrentProcess
RtlUnwind
HeapReAlloc
GetSystemTimeAsFileTime
GetProcessHeap
CreateFileA
SetFilePointer
DeleteFileA
GetSystemTime
CompareFileTime
GetModuleFileNameA
lstrcpyA
GlobalFree
GlobalUnlock
MulDiv
GetNumberFormatA
SetUnhandledExceptionFilter
GetFileAttributesW
InterlockedDecrement
WaitForSingleObject
WriteConsoleW
FindNextFileW
BackupRead
TlsSetValue
IsDebuggerPresent
HeapFree
GetCurrentThread
GetLocaleInfoA
FileTimeToDosDateTime
GetPrivateProfileIntA
LoadLibraryExA
CreateMutexA
UpdateResourceA
EnumResourceNamesA
OpenFileMappingA
GetProcAddress
SetThreadPriority
SetErrorMode
GetStringTypeA
HeapCreate
GetConsoleMode
FileTimeToSystemTime
GetTimeFormatA
GetTickCount
CreateFileMappingA
VirtualAlloc
WritePrivateProfileStringA
MoveFileA
FindCloseChangeNotification
SetLastError
ReleaseMutex
lstrlenA
SetPriorityClass
GetCPInfo
MultiByteToWideChar
IsValidCodePage
GetDiskFreeSpaceA
FreeEnvironmentStringsA
CopyFileA
GlobalLock
HeapSize
GetLogicalDrives
GetVersion
DosDateTimeToFileTime
ExpandEnvironmentStringsW
Sleep
GetProcessAffinityMask
LCMapStringA
GetModuleHandleA
SetHandleCount
MapViewOfFile
CompareStringA
WaitForMultipleObjects
FindFirstFileW
SystemTimeToFileTime
GetLastError
GetFileTime
SetEndOfFile
LeaveCriticalSection
GetTempPathA
RaiseException
SizeofResource
CreateFileW
SetEvent
FreeLibrary
GlobalAlloc
FindNextChangeNotification
comdlg32
CommDlgExtendedError
GetSaveFileNameA
GetOpenFileNameA
GetOpenFileNameW
ChooseFontA
user32
ShowWindow
SetWindowLongA
GetLastActivePopup
PtInRect
CharLowerW
SetWindowPlacement
DrawMenuBar
DestroyWindow
InsertMenuItemA
GetWindowRect
SendMessageW
CreateIcon
GetMessageA
BeginPaint
DefWindowProcA
SetForegroundWindow
SetScrollRange
IsDialogMessageA
GetDC
DestroyMenu
IsWindowEnabled
EmptyClipboard
ScrollWindowEx
GetWindowPlacement
SendDlgItemMessageA
CharUpperA
GetSystemMenu
GetWindowTextLengthA
ScreenToClient
LoadImageA
SetDlgItemTextA
GetWindowLongA
IsCharAlphaA
GetDialogBaseUnits
SetTimer
DrawIconEx
BringWindowToTop
GetSystemMetrics
FillRect
SetMenuItemInfoA
SetPropA
GetKeyState
CheckMenuItem
EnumWindows
GetClipboardData
ExitWindowsEx
CloseClipboard
EndDialog
GetCursorPos
GetFocus
CharToOemA
RedrawWindow
SetMenu
GetWindowTextW
SendMessageA
RegisterClassA
GetClientRect
CreatePopupMenu
PostQuitMessage
IsDlgButtonChecked
OemToCharBuffA
IsWindow
EnableWindow
CreateIconIndirect
FindWindowA
RegisterWindowMessageA
LoadCursorA
DialogBoxParamA
SetDlgItemInt
GetDlgItemTextA
CreateDialogParamA
IsCharUpperW
IsCharUpperA
KillTimer
ReleaseDC
MessageBeep
UpdateWindow
CharToOemBuffA
AppendMenuA
TrackPopupMenu
MapWindowPoints
IsCharAlphaW
CreateDialogIndirectParamA
CreateWindowExA
GetMenuItemCount
GetPropA
GetWindowTextA
GetClassNameA
GetMenuItemInfoA
DeleteMenu
MoveWindow
FlashWindow
LoadStringA
PostMessageA
ClientToScreen
InvalidateRect
ValidateRect
GetMenu
WindowFromPoint
FindWindowExA
DestroyIcon
EnumChildWindows
TranslateAcceleratorA
IsWindowVisible
SetCursor
OemToCharA
SetFocus
TranslateMessage
MessageBoxA
SetDlgItemTextW
LoadBitmapA
GetMenuState
IntersectRect
DispatchMessageA
SetWindowTextA
SetWindowPos
GetDesktopWindow
GetMenuItemID
GetDlgItem
LoadIconA
GetWindow
LoadAcceleratorsA
SetScrollPos
PostThreadMessageA
OpenClipboard
IsChild
GetSubMenu
CharLowerA
CheckDlgButton
PeekMessageA
GetSysColor
CharUpperW
CopyImage
GetIconInfo
IsIconic
CopyIcon
RegisterClipboardFormatA
GetWindowThreadProcessId
LoadMenuA
InsertMenuA
RemovePropA
AppendMenuW
EndPaint
GetDlgItemInt
CallWindowProcA
SetWindowTextW
EnableMenuItem
SetClipboardData
GetParent
shell32
SHGetSpecialFolderLocation
SHGetMalloc
SHBrowseForFolderA
DragAcceptFiles
SHGetDesktopFolder
SHFileOperationA
SHGetFileInfoA
DragQueryFileA
ExtractIconExA
SHGetPathFromIDListA
DragQueryFileW
SHChangeNotify
DragFinish
ShellExecuteA
FindExecutableA
ShellExecuteExA
Shell_NotifyIconA
msvfw32
DrawDibSetPalette
ICRemove
comctl32
ImageList_Create
ImageList_ReplaceIcon
ImageList_Remove
PropertySheetA
ImageList_Destroy
ImageList_AddMasked
ImageList_Add
gdi32
ExtTextOutA
GetTextExtentPoint32A
CreateSolidBrush
SelectObject
Rectangle
CreatePatternBrush
GetDeviceCaps
DeleteDC
SetTextColor
Polyline
Polygon
TextOutA
BitBlt
GetObjectA
CreateCompatibleBitmap
CreateBitmap
GetTextMetricsA
LineTo
CreateCompatibleDC
SetMapMode
CreatePen
MoveToEx
CreateFontA
DPtoLP
StretchBlt
GetTextFaceA
SetPixel
GetMapMode
DeleteObject
GetPixel
SetBkColor
ole32
CoCreateInstance
OleSetClipboard
DoDragDrop
OleInitialize
OleUninitialize
advapi32
RegDeleteValueA
SetFileSecurityA
RegCloseKey
GetFileSecurityW
LookupPrivilegeValueA
RegSetValueExA
RegQueryValueExW
AdjustTokenPrivileges
RegEnumKeyExA
OpenProcessToken
GetFileSecurityA
RegCreateKeyExA
GetSecurityDescriptorLength
RegEnumValueA
RegOpenKeyExA
RegSetValueExW
SetFileSecurityW
RegDeleteKeyA
RegQueryValueExA
Sections
.text Size: 515KB - Virtual size: 515KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 405KB - Virtual size: 3.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ