Static task
static1
Behavioral task
behavioral1
Sample
456add656429397c6419c3f4f6f646ae_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
456add656429397c6419c3f4f6f646ae_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
456add656429397c6419c3f4f6f646ae_JaffaCakes118
-
Size
940KB
-
MD5
456add656429397c6419c3f4f6f646ae
-
SHA1
2522057edb879f222b29d54f82cb49cf82fa91f6
-
SHA256
51174b6bf60256c29f67231f4b480eb007f93d6eb4c1c104b67bf1abaa6af542
-
SHA512
2f0bc9b5c28f951fd2c8acaf39bbe78e7d51344b7bc9c5ba92068e86fe20ee3bc195764d3f0f820e8829c5769bccbc4d8f71febbbc472104fa61ba075cc59054
-
SSDEEP
24576:pqAKPcPxc0ormgRxH6qEAe5J0jxwRsZLjf:0SpS6qET52GRkj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 456add656429397c6419c3f4f6f646ae_JaffaCakes118
Files
-
456add656429397c6419c3f4f6f646ae_JaffaCakes118.exe windows:5 windows x86 arch:x86
075af87df9a52c7111f9fd1c97a9f010
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileTime
GetOEMCP
LocalFileTimeToFileTime
BackupSeek
SetCurrentDirectoryA
GetNumberFormatA
GlobalAlloc
GetProcessHeap
lstrlenA
LoadLibraryExA
DeleteCriticalSection
WritePrivateProfileStringA
GetFileAttributesA
GetTimeFormatA
GetCPInfo
GetProcessAffinityMask
DosDateTimeToFileTime
MoveFileA
MapViewOfFile
EndUpdateResourceA
DeleteFileW
GetACP
GetTempPathA
GetProcAddress
FileTimeToSystemTime
GetStringTypeW
UpdateResourceA
ReadFile
GetCurrentThreadId
InterlockedDecrement
FindClose
GetEnvironmentStrings
GetLastError
HeapFree
GetCurrentDirectoryW
SetStdHandle
LeaveCriticalSection
GetCurrentProcessId
GetProfileStringA
IsValidCodePage
DeleteFileA
RemoveDirectoryW
SetLastError
SetErrorMode
ResetEvent
GetFullPathNameW
SetEndOfFile
LoadResource
EnterCriticalSection
GetModuleFileNameA
FindFirstFileA
GlobalSize
GetLocaleInfoA
GlobalFree
CreateFileMappingA
HeapCreate
CloseHandle
ExpandEnvironmentStringsW
SuspendThread
EnumResourceLanguagesA
RaiseException
GetSystemTimeAsFileTime
GetDiskFreeSpaceA
GetCompressedFileSizeA
SetFileAttributesW
GetModuleHandleW
IsDebuggerPresent
MulDiv
IsDBCSLeadByte
GetCurrentDirectoryA
ResumeThread
ExpandEnvironmentStringsA
FormatMessageA
FileTimeToDosDateTime
TlsFree
CompareFileTime
GlobalMemoryStatus
GetDateFormatA
WideCharToMultiByte
FindFirstChangeNotificationA
FindCloseChangeNotification
TlsGetValue
GetPriorityClass
SetPriorityClass
CreateMutexA
GlobalUnlock
SetEnvironmentVariableA
GetLocalTime
QueryPerformanceCounter
BeginUpdateResourceA
GetVersionExA
GetLogicalDriveStringsA
GetCurrentProcess
lstrcpyA
HeapAlloc
GetStartupInfoA
WaitForSingleObject
BackupRead
GetThreadPriority
MoveFileW
WaitForMultipleObjects
CompareStringW
WriteFile
GetFullPathNameA
GetVersion
GetModuleHandleA
UnhandledExceptionFilter
LCMapStringA
SetThreadPriority
VirtualAlloc
SetFilePointer
SystemTimeToFileTime
GetConsoleCP
FlushFileBuffers
CreateEventA
TlsSetValue
ReleaseMutex
GlobalLock
LCMapStringW
FindFirstFileW
GetFileType
SetFileAttributesA
SizeofResource
EnumResourceNamesA
LocalFree
GetStdHandle
GetPrivateProfileIntA
CreateThread
lstrcmpiA
UnmapViewOfFile
SetEvent
GetConsoleMode
FindNextFileA
ExitProcess
GetDriveTypeA
TerminateProcess
FreeEnvironmentStringsA
SetCurrentDirectoryW
SetHandleCount
GetStringTypeA
GetFileAttributesW
VirtualFree
OpenFileMappingA
GetCommandLineA
RtlUnwind
WriteConsoleA
SetUnhandledExceptionFilter
InterlockedIncrement
InitializeCriticalSectionAndSpinCount
RemoveDirectoryA
FreeLibrary
TlsAlloc
LoadLibraryA
CreateDirectoryW
ExitThread
GetConsoleOutputCP
GetLogicalDrives
MultiByteToWideChar
WriteConsoleW
FindNextChangeNotification
FindResourceA
CompareStringA
Sleep
DeviceIoControl
CopyFileA
CreateFileA
GetPrivateProfileStringA
HeapSize
GetCurrentThread
CreateDirectoryA
CreateFileW
FreeEnvironmentStringsW
GetSystemTime
GetCommandLineW
FileTimeToLocalFileTime
HeapReAlloc
FindNextFileW
SetFileTime
GetTickCount
GetEnvironmentStringsW
msvfw32
DrawDibSetPalette
ICRemove
advapi32
OpenProcessToken
AdjustTokenPrivileges
RegQueryValueExW
RegSetValueExW
RegEnumValueA
RegDeleteKeyA
GetFileSecurityA
RegOpenKeyExA
GetSecurityDescriptorLength
RegCloseKey
RegQueryValueExA
RegDeleteValueA
SetFileSecurityW
GetFileSecurityW
SetFileSecurityA
RegCreateKeyExA
RegSetValueExA
RegEnumKeyExA
LookupPrivilegeValueA
ole32
CoCreateInstance
DoDragDrop
OleSetClipboard
OleInitialize
OleUninitialize
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetDesktopFolder
ShellExecuteA
ExtractIconExA
Shell_NotifyIconA
DragQueryFileW
DragAcceptFiles
ShellExecuteExA
SHGetFileInfoA
DragFinish
SHChangeNotify
SHGetSpecialFolderLocation
DragQueryFileA
SHFileOperationA
SHGetMalloc
FindExecutableA
user32
SetMenu
GetDlgItemInt
BeginPaint
GetWindowTextA
OemToCharBuffA
SetScrollRange
UpdateWindow
GetDialogBaseUnits
PtInRect
CreateDialogIndirectParamA
CreateWindowExA
DialogBoxParamA
SetClipboardData
PeekMessageA
SetCursor
LoadImageA
SetWindowPos
LoadIconA
GetWindowThreadProcessId
ExitWindowsEx
SetScrollPos
PostQuitMessage
GetMenu
EnableMenuItem
GetClassNameA
GetCursorPos
InsertMenuItemA
SetWindowPlacement
SetDlgItemTextW
SendDlgItemMessageA
IsDlgButtonChecked
FlashWindow
SetForegroundWindow
DefWindowProcA
ScrollWindowEx
GetMessageA
GetWindowTextW
ScreenToClient
OemToCharA
MapWindowPoints
GetMenuItemID
SetPropA
DrawMenuBar
CreateDialogParamA
GetClipboardData
GetSysColor
DestroyMenu
SetWindowTextA
IsCharAlphaA
EmptyClipboard
CopyImage
GetFocus
EnableWindow
IsCharAlphaW
RegisterClassA
FillRect
GetWindowLongA
CreateIconIndirect
PostMessageA
GetSystemMenu
AppendMenuW
IsWindow
WindowFromPoint
ClientToScreen
DrawIconEx
CheckMenuItem
IsCharUpperA
SendMessageA
EnumChildWindows
CharUpperW
GetMenuItemInfoA
IsWindowEnabled
KillTimer
GetWindowTextLengthA
OpenClipboard
IsCharUpperW
MoveWindow
CharToOemA
SetWindowLongA
DispatchMessageA
DeleteMenu
GetDesktopWindow
DestroyWindow
IsWindowVisible
RedrawWindow
GetWindow
CharLowerW
ReleaseDC
TranslateAcceleratorA
FindWindowA
ValidateRect
GetLastActivePopup
IsIconic
SendMessageW
TrackPopupMenu
GetPropA
PostThreadMessageA
ShowWindow
AppendMenuA
CharUpperA
CharLowerA
IsChild
IntersectRect
LoadAcceleratorsA
GetDlgItem
SetMenuItemInfoA
RemovePropA
MessageBoxA
EndDialog
FindWindowExA
GetKeyState
GetIconInfo
RegisterClipboardFormatA
GetClientRect
GetSystemMetrics
DestroyIcon
LoadBitmapA
GetParent
CreatePopupMenu
CloseClipboard
SetWindowTextW
BringWindowToTop
GetSubMenu
EnumWindows
LoadMenuA
GetWindowRect
RegisterWindowMessageA
IsDialogMessageA
GetDlgItemTextA
GetWindowPlacement
CopyIcon
GetMenuState
SetDlgItemInt
EndPaint
SetDlgItemTextA
CharToOemBuffA
SetFocus
TranslateMessage
CreateIcon
CheckDlgButton
GetMenuItemCount
GetDC
LoadCursorA
SetTimer
CallWindowProcA
MessageBeep
LoadStringA
InsertMenuA
InvalidateRect
comctl32
ImageList_Remove
ImageList_Add
ImageList_Destroy
ImageList_AddMasked
PropertySheetA
ImageList_ReplaceIcon
ImageList_Create
gdi32
StretchBlt
CreatePatternBrush
Rectangle
CreateFontA
GetTextFaceA
GetObjectA
SetPixel
GetMapMode
MoveToEx
DeleteObject
SelectObject
CreateCompatibleDC
GetTextMetricsA
TextOutA
DPtoLP
GetTextExtentPoint32A
CreateBitmap
CreateSolidBrush
BitBlt
ExtTextOutA
SetMapMode
GetDeviceCaps
Polyline
SetBkColor
DeleteDC
CreateCompatibleBitmap
CreatePen
Polygon
LineTo
SetTextColor
GetPixel
comdlg32
CommDlgExtendedError
GetOpenFileNameA
GetOpenFileNameW
GetSaveFileNameA
ChooseFontA
Sections
.text Size: 515KB - Virtual size: 515KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 405KB - Virtual size: 3.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ