Static task
static1
Behavioral task
behavioral1
Sample
490577b1ba987a55c4845341eb7e454f_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
490577b1ba987a55c4845341eb7e454f_JaffaCakes118
-
Size
532KB
-
MD5
490577b1ba987a55c4845341eb7e454f
-
SHA1
8a1da14e72f242b23fb32341c697d98ef874f2e7
-
SHA256
0e817ca24248e4b91a6fc96da0aa15bb524981c009e80feb017c46d15393e210
-
SHA512
d7e2b2f8d260cf34abf3a20b83f759914bb6a9595761ef6afe4c1b711eb19df9ab7ef8093b339315f0e9ef325828ef3ba951f438a43e0bd70aefec60d5bbe9b0
-
SSDEEP
12288:BVP50PFRR8SlrPva3AGQf6OX6+Eg8VPnYU1E99+eDuUlG4I:LMRxPvOAX+f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 490577b1ba987a55c4845341eb7e454f_JaffaCakes118
Files
-
490577b1ba987a55c4845341eb7e454f_JaffaCakes118.exe windows:4 windows x86 arch:x86
b03a537e2abbbb157a69f4c65914ef19
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
userenv
GetProfilesDirectoryA
kernel32
GetCurrentProcessId
ReadFile
SetFilePointer
SetEndOfFile
GetThreadLocale
InterlockedIncrement
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
RtlUnwind
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
VirtualAlloc
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
HeapSize
SetStdHandle
GetFileType
GetACP
LCMapStringA
LCMapStringW
GetStdHandle
VirtualFree
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
InterlockedDecrement
GetModuleFileNameW
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
FreeResource
GlobalLock
GlobalUnlock
OpenMutexA
CreateMutexA
GetUserDefaultLangID
GetStartupInfoA
CreateProcessA
GetExitCodeProcess
WaitForSingleObject
TerminateProcess
CreateDirectoryA
FlushFileBuffers
GlobalAlloc
GlobalFree
HeapFree
GetProcessHeap
HeapAlloc
GetSystemDirectoryA
GetShortPathNameA
GetLocaleInfoA
GetFileTime
CompareFileTime
WritePrivateProfileStringA
lstrcmpA
GetTempPathA
GetDriveTypeA
LocalAlloc
Sleep
FormatMessageA
LocalFree
GetSystemDefaultLangID
InitializeCriticalSection
GetFileSize
DeleteCriticalSection
QueryPerformanceCounter
QueryPerformanceFrequency
WriteFile
OutputDebugStringA
CreateFileA
GetEnvironmentVariableA
CompareStringW
CompareStringA
GetVersion
InterlockedExchange
GetVersionExA
SetFileAttributesA
DeleteFileA
RemoveDirectoryA
FindResourceExA
SetLastError
GetCommandLineA
GetWindowsDirectoryA
FindFirstFileA
FindNextFileA
FindClose
GetPrivateProfileStringA
CloseHandle
GetCurrentDirectoryA
lstrlenA
MulDiv
GlobalAddAtomA
GlobalDeleteAtom
GetCurrentThreadId
GetTickCount
GetModuleHandleA
GetModuleFileNameA
GetFullPathNameA
GetFileAttributesA
GetProcAddress
GetCurrentProcess
FreeLibrary
LoadLibraryA
MultiByteToWideChar
GetLastError
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
FindResourceA
LoadResource
LockResource
SizeofResource
ExitProcess
user32
UnregisterClassA
DestroyMenu
LoadCursorA
GetSysColorBrush
SetCursor
GetMessageA
GetCursorPos
ValidateRect
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
IsDialogMessageA
IsDlgButtonChecked
CheckDlgButton
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
CheckMenuItem
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
GetForegroundWindow
GetLastActivePopup
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetWindowTextLengthA
GetWindowTextA
GetParent
GetWindow
SetFocus
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
IsWindow
WaitForInputIdle
MsgWaitForMultipleObjects
PostQuitMessage
GetWindowThreadProcessId
SetWindowTextA
GetSystemMetrics
MessageBoxA
EnumWindows
GetClassNameA
FindWindowA
GetDlgItem
GetDesktopWindow
GetWindowRect
IsIconic
LoadBitmapA
GetWindowLongA
GetMessagePos
GetDC
SetWindowLongA
ReleaseDC
PeekMessageA
TranslateMessage
DispatchMessageA
PostMessageA
SendMessageA
RegisterWindowMessageA
LoadIconA
EnableWindow
ScreenToClient
SetMenuItemBitmaps
gdi32
DeleteDC
GetStockObject
CreateSolidBrush
DeleteObject
SetMapMode
SetBkMode
RestoreDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateFontA
GetLayout
SetLayout
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
StretchBlt
BitBlt
GetObjectA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegQueryValueA
RegEnumKeyA
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
RegOpenKeyExA
RegDeleteKeyA
RegQueryValueExA
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantChangeType
VariantInit
VariantClear
OleLoadPicturePath
Sections
.text Size: 256KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.1rdata Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE