Static task
static1
Behavioral task
behavioral1
Sample
468a9f40a0b6ff89ba31b802def6158c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
468a9f40a0b6ff89ba31b802def6158c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
468a9f40a0b6ff89ba31b802def6158c_JaffaCakes118
-
Size
328KB
-
MD5
468a9f40a0b6ff89ba31b802def6158c
-
SHA1
8f85e92e038ed21af3ddde13da60b96ff781fe9b
-
SHA256
60c1fb94d0c9e48e89af0d7717104ceece345807956fb8f9120fd7ee1ccdcada
-
SHA512
653521ab13f52560c7ec293fe67174786711aa6f88f5182b67d7b57674376e108c6201aa5dda854f474fae61f9b1ee56f01470472dea78ad9bfc677f4c8682c4
-
SSDEEP
3072:nPzYYufLKut2pCGxOtYW5OMLQJvZMJ2xp1ufv3U9xJlOEbEbalTZyvFLHQBvtEEY:PzY5rEdasvZMS0vE3vfbopsBmEXSz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 468a9f40a0b6ff89ba31b802def6158c_JaffaCakes118
Files
-
468a9f40a0b6ff89ba31b802def6158c_JaffaCakes118.exe windows:4 windows x86 arch:x86
666a706ff6528b0d04f41066d01c025a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetOpenFileNameW
GetSaveFileNameW
rpcrt4
RpcStringFreeA
UuidCreate
UuidToStringA
kernel32
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetCPInfo
ExitProcess
Sleep
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleA
GetStdHandle
WriteFile
HeapCreate
GetCurrentProcessId
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
GetStringTypeA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
InterlockedCompareExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
WideCharToMultiByte
CreateFileA
GetFileSize
FormatMessageA
SetFilePointer
ReadFile
GetTempPathW
CreateFileW
CloseHandle
GetProcAddress
FormatMessageW
GetVersionExA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
RaiseException
GetModuleFileNameW
FlushInstructionCache
GetLastError
InterlockedIncrement
GetCurrentProcess
VirtualAlloc
GlobalLock
lstrlenA
FindResourceExW
InitializeCriticalSection
EnterCriticalSection
LoadLibraryW
GetCommandLineW
InterlockedDecrement
LoadResource
GetCurrentThreadId
lstrlenW
GetTickCount
LoadLibraryExW
GetModuleFileNameA
GlobalUnlock
LockResource
GetVersionExW
GetModuleHandleW
lstrcmpiW
DeleteFileW
GlobalAlloc
DeleteCriticalSection
MultiByteToWideChar
FreeLibrary
lstrcmpW
VirtualQuery
MulDiv
GetStartupInfoW
SizeofResource
SetLastError
FindResourceW
LeaveCriticalSection
VirtualProtect
LocalAlloc
IsDebuggerPresent
mkzlib
inflateInit_
inflateReset
inflate
inflateEnd
mkunicode
Utf16ToUtf8
iso_getentry
user32
SetMenuDefaultItem
IsWindow
InvalidateRgn
DefWindowProcW
GetDoubleClickTime
MapDialogRect
IsWindowVisible
SystemParametersInfoW
SetDlgItemInt
GetSystemMetrics
UnregisterClassA
IsChild
PostMessageW
CreateAcceleratorTableW
GetDC
SetDlgItemTextW
TranslateAcceleratorW
RedrawWindow
PostQuitMessage
GetSysColorBrush
MoveWindow
SetTimer
IsDialogMessageW
LoadMenuW
GetCursorPos
LoadImageW
GetWindowLongW
GetDlgCtrlID
EndPaint
SetCursor
GetDlgItemInt
SetFocus
AppendMenuW
SendMessageW
MessageBeep
IntersectRect
SetWindowLongW
CharNextW
DrawTextW
PeekMessageW
DestroyWindow
GetFocus
KillTimer
GetDesktopWindow
SetWindowTextW
FillRect
CreateDialogParamW
GetDialogBaseUnits
CallWindowProcW
GetCapture
GetWindowTextLengthW
DialogBoxParamW
ClientToScreen
DestroyCursor
CreateWindowExW
MessageBoxW
SetMenuItemInfoW
LoadCursorW
DestroyAcceleratorTable
GetMessageW
LoadStringA
GetSysColor
DestroyMenu
GetKeyState
BeginPaint
InflateRect
EqualRect
TrackPopupMenu
DrawEdge
DrawFocusRect
GetWindow
LoadStringW
OffsetRect
GetClassLongW
TranslateMessage
GetDCEx
RemoveMenu
SetCapture
SetWindowPos
TrackPopupMenuEx
ReleaseCapture
GetWindowDC
LoadAcceleratorsW
EndDialog
MapWindowPoints
MonitorFromPoint
ShowWindow
ScreenToClient
GetWindowRect
GetMenuItemInfoW
EnableWindow
CopyRect
DispatchMessageW
PtInRect
RegisterWindowMessageW
GetParent
GetDlgItem
SetRectEmpty
GetClassInfoExW
InvalidateRect
GetWindowTextW
GetClassNameW
ReleaseDC
GetClientRect
GetMenuItemCount
GetMonitorInfoW
RegisterClassExW
CreatePopupMenu
advapi32
RegOpenKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegDeleteValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegCloseKey
ole32
OleLockRunning
CoGetClassObject
CoCreateInstance
CreateStreamOnHGlobal
OleInitialize
GetRunningObjectTable
CoTaskMemAlloc
CoTaskMemRealloc
DoDragDrop
CLSIDFromString
StringFromGUID2
CLSIDFromProgID
CoTaskMemFree
OleUninitialize
CreateItemMoniker
oleaut32
VariantInit
SysAllocString
SysStringLen
SysAllocStringLen
VariantClear
SysStringByteLen
VarUI4FromStr
VariantChangeType
OleCreatePropertyFrame
DispCallFunc
LoadTypeLi
SysFreeString
VarBstrCmp
LoadRegTypeLi
OleCreateFontIndirect
shlwapi
UrlEscapeW
SHAutoComplete
StrCmpIW
comctl32
ImageList_SetOverlayImage
ImageList_GetImageInfo
ImageList_Draw
ImageList_LoadImageW
InitCommonControlsEx
_TrackMouseEvent
gdi32
CreateRectRgn
PatBlt
SetWindowOrgEx
CreateFontW
CreatePen
GetStockObject
Polygon
SelectObject
LineTo
GetObjectW
ExtTextOutW
RestoreDC
LPtoDP
SetBkColor
AddFontMemResourceEx
DeleteDC
IntersectClipRect
CreateCompatibleBitmap
SelectClipRgn
GetDeviceCaps
CreateRectRgnIndirect
GetClipBox
ExcludeClipRect
RemoveFontMemResourceEx
DeleteObject
DPtoLP
CombineRgn
SetViewportOrgEx
Polyline
MoveToEx
GetClipRgn
BitBlt
CreateSolidBrush
CreateFontIndirectW
SetBkMode
SetTextColor
SaveDC
CreateCompatibleDC
Sections
.text Size: 227KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 13KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE