Static task
static1
Behavioral task
behavioral1
Sample
44455c74dac70cbcdd203760959833b2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
44455c74dac70cbcdd203760959833b2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
44455c74dac70cbcdd203760959833b2_JaffaCakes118
-
Size
133KB
-
MD5
44455c74dac70cbcdd203760959833b2
-
SHA1
6d6e5454fdb13840207edeb74fa2b415062a7b94
-
SHA256
eb7efd7452824cb108a09b4ec09ad2b5701a38765bb232b1a64b999ceb3d5b4a
-
SHA512
8c7c7e0570af6ba5b7cc0ec9c55aae70a9ed34edaa20023d7c80c09ea8fa9e70611bb28492feb3254f2499a7c03ba6536dc3e3ca6fd2870dbface83a910f3cd1
-
SSDEEP
3072:3JatDl5oq8g2QF44i1OS55LJe3KiRgGeO9w:3MdgBQFTi1OOtJe3H3w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44455c74dac70cbcdd203760959833b2_JaffaCakes118
Files
-
44455c74dac70cbcdd203760959833b2_JaffaCakes118.exe windows:5 windows x86 arch:x86
c98d864f18a199402132e0a3741f36a6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
lstrlenW
FlushInstructionCache
RaiseException
GetStringTypeExA
GetShortPathNameA
SetThreadLocale
FindFirstFileA
GetLastError
SetLastError
lstrcmpiA
GetThreadLocale
GetProcAddress
EnterCriticalSection
GetTempFileNameA
FindClose
LoadLibraryA
LockResource
CreateEventW
GetModuleFileNameA
FindNextFileA
GetModuleHandleA
LoadLibraryExA
VirtualProtect
OpenEventW
DeleteCriticalSection
GetCurrentThreadId
GetVersionExA
CloseHandle
GetTempPathA
GetSystemTime
DeleteFileA
GetLocaleInfoA
GetEnvironmentVariableA
GetStringTypeA
LCMapStringW
LCMapStringA
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetStdHandle
ExitProcess
GetSystemDirectoryA
ReadFile
IsDBCSLeadByte
GetExitCodeProcess
GetFileAttributesA
LeaveCriticalSection
SizeofResource
GetVolumeInformationA
WideCharToMultiByte
FindResourceExA
InitializeCriticalSection
WriteFile
GetWindowsDirectoryA
GetTickCount
SetEvent
WaitForSingleObject
GetUserDefaultLCID
GetCurrentProcess
InterlockedDecrement
InterlockedIncrement
LoadResource
FreeLibrary
lstrlenA
FreeResource
lstrcmpA
FindResourceA
GetFileSize
CreateFileA
Sleep
HeapReAlloc
HeapCreate
GetStartupInfoA
GetCommandLineA
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
GetComputerNameA
GetStringTypeW
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
user32
DialogBoxParamA
SetDlgItemTextA
EnableWindow
UpdateWindow
MapWindowPoints
LoadImageA
SetWindowTextA
GetWindow
CallWindowProcA
GetWindowTextA
ClientToScreen
SetCursor
GetMessageA
SetTimer
ScreenToClient
GetWindowRect
LoadStringA
GetParent
CharNextA
GetClientRect
GetWindowTextLengthA
SendMessageA
UnregisterClassA
SetWindowLongA
MessageBoxA
InvalidateRect
CharLowerA
GetWindowLongA
GetDlgItem
EndDialog
DefWindowProcA
RedrawWindow
GetSysColor
SetWindowPos
LoadStringW
CheckDlgButton
IsDlgButtonChecked
GetActiveWindow
PostMessageA
wvsprintfA
SystemParametersInfoA
GetSystemMetrics
gdi32
SetTextColor
CreateFontIndirectA
DeleteObject
GetObjectA
GetStockObject
CreateSolidBrush
advapi32
RegCreateKeyExA
CloseServiceHandle
CreateWellKnownSid
RegCloseKey
GetUserNameA
OpenSCManagerA
RegDeleteValueA
LsaClose
RegQueryInfoKeyA
RegOpenKeyExA
OpenServiceA
ChangeServiceConfigA
RegEnumKeyExA
RegDeleteKeyA
LsaAddAccountRights
RegQueryValueExA
RegSetValueExA
GetTokenInformation
LsaOpenPolicy
OpenProcessToken
shell32
ShellExecuteExA
ShellExecuteA
ole32
StringFromGUID2
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoInitialize
CoCreateInstance
oleaut32
VarUI4FromStr
comctl32
InitCommonControlsEx
wininet
InternetCanonicalizeUrlA
InternetCrackUrlA
Sections
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ