Static task
static1
Behavioral task
behavioral1
Sample
4a45262f75e06d4274c13d84d95214a7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4a45262f75e06d4274c13d84d95214a7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4a45262f75e06d4274c13d84d95214a7_JaffaCakes118
-
Size
758KB
-
MD5
4a45262f75e06d4274c13d84d95214a7
-
SHA1
69d5bf8aefb5984286107617b0ce71f026bd1517
-
SHA256
284ee87a6751d1c031bf5305ca4f5025cf8043f3fe71f0712514beda6444e640
-
SHA512
6cdf006b0e0ccd0d3b187b182981ec38fb91619d12fbaff891374e85ffad13ec34919f25acb631e1b47a1bd4f9e210d8ce791300ec2e5c39519c283b20da52c2
-
SSDEEP
12288:iDRupD1RnwhLd0taOSNUWH+zs+ilvG7o98+L+rDNAhxpwXQA1aJf0ZP5sx0ZO:iNupAh+tvWmY8+L+rDehUQA1aJfCG0ZO
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a45262f75e06d4274c13d84d95214a7_JaffaCakes118
Files
-
4a45262f75e06d4274c13d84d95214a7_JaffaCakes118.exe windows:4 windows x64 arch:x64
48144fd6400567b9a122a5cb2409b13d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
wsock32
__WSAFDIsSet
recv
send
socket
connect
closesocket
bind
select
accept
htons
sendto
recvfrom
ntohs
WSAGetLastError
ioctlsocket
WSACleanup
inet_addr
gethostbyname
WSAStartup
gethostname
listen
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
winmm
waveOutSetVolume
timeGetTime
mciSendStringW
comctl32
ImageList_EndDrag
ImageList_DragLeave
ImageList_DragMove
ImageList_DragEnter
ImageList_BeginDrag
ImageList_SetDragCursorImage
ImageList_Destroy
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
ImageList_Remove
mpr
WNetUseConnectionW
WNetGetConnectionW
WNetAddConnection2W
WNetCancelConnection2W
kernel32
ReadFile
SetFilePointer
SizeofResource
EnumResourceNamesW
DeleteFileW
FindNextFileW
lstrcmpiW
MoveFileW
CopyFileW
OutputDebugStringW
GetLastError
CreateDirectoryW
RemoveDirectoryW
TerminateProcess
WaitForSingleObject
SetSystemPowerState
SetFileTime
GetFileAttributesW
FindResourceW
FindFirstFileW
LoadResource
FindClose
LockResource
GetLocalTime
MultiByteToWideChar
WideCharToMultiByte
CompareStringW
GetTempPathW
GetTempFileNameW
VirtualFree
FormatMessageW
GetExitCodeProcess
SetVolumeLabelW
DeviceIoControl
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileSectionW
WritePrivateProfileSectionW
GetPrivateProfileSectionNamesW
SetFileAttributesW
GetShortPathNameW
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetDriveTypeW
SetErrorMode
GetDiskFreeSpaceW
GetVolumeInformationW
SetProcessWorkingSetSize
GlobalMemoryStatus
CreateFileW
GetFileSize
GetEnvironmentVariableW
SetEnvironmentVariableW
GlobalFree
GlobalLock
GlobalUnlock
GlobalAlloc
GetComputerNameW
GetWindowsDirectoryW
GetSystemDirectoryW
GetCurrentProcessId
CreateProcessW
SetPriorityClass
LoadLibraryW
VirtualAlloc
CreatePipe
DuplicateHandle
GetStdHandle
WriteFile
GetFileType
PeekNamedPipe
SetLastError
LoadLibraryExW
GlobalFindAtomW
GetStartupInfoW
GetProcessHeap
GetVersionExA
LeaveCriticalSection
EnterCriticalSection
ResumeThread
GetSystemTimeAsFileTime
CreateThread
ExitThread
HeapFree
HeapAlloc
ExitProcess
GetModuleHandleA
FlsSetValue
TlsFree
FlsFree
TlsSetValue
FlsAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlCaptureContext
RaiseException
RtlPcToFileHeader
GetModuleFileNameA
DeleteCriticalSection
RtlUnwindEx
HeapSize
HeapSetInformation
HeapCreate
GetConsoleCP
GetConsoleMode
CreateFileMappingW
OpenProcess
UnmapViewOfFile
CloseHandle
ReadProcessMemory
WriteProcessMemory
MapViewOfFile
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleHandleW
GetSystemInfo
GetCurrentProcess
GetVersionExW
GetCurrentThreadId
Sleep
IsDebuggerPresent
GetCurrentDirectoryW
GetModuleFileNameW
GetFullPathNameW
SetHandleCount
GetStartupInfoA
SetStdHandle
SetCurrentDirectoryW
FreeLibrary
GetProcAddress
LoadLibraryA
InitializeCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FlsGetValue
FlushFileBuffers
LCMapStringA
LCMapStringW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
GetTickCount
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapReAlloc
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
RtlVirtualUnwind
RtlLookupFunctionEntry
SetEndOfFile
CompareStringA
Beep
SetEnvironmentVariableA
user32
GetActiveWindow
InflateRect
CharNextW
DrawFocusRect
wsprintfW
DrawTextW
RedrawWindow
FrameRect
DrawFrameControl
FillRect
PtInRect
DrawMenuBar
SubtractRect
OffsetRect
GetClassWord
GetNextDlgTabItem
GetWindow
IsChild
ReleaseCapture
SetCapture
ReleaseDC
GetCursor
GetDC
WindowFromPoint
SetClipboardData
EmptyClipboard
CharLowerBuffW
UnregisterHotKey
GetMessageW
LockWindowUpdate
DispatchMessageW
TranslateMessage
PeekMessageW
mouse_event
ExitWindowsEx
SetActiveWindow
FindWindowExW
EnumThreadWindows
LoadImageW
CreateIconFromResourceEx
SetWindowLongPtrW
InsertMenuItemW
IsMenu
TrackPopupMenuEx
GetCursorPos
DeleteMenu
CreateIcon
CheckMenuRadioItem
GetMenuItemID
SetMenuItemInfoW
GetMenuItemInfoW
GetWindowLongW
IsIconic
FindWindowW
SystemParametersInfoW
GetAsyncKeyState
SetKeyboardState
GetKeyboardState
OpenClipboard
keybd_event
VkKeyScanA
GetKeyboardLayoutNameA
CharUpperW
LoadStringW
DialogBoxParamW
MessageBeep
EndDialog
SendDlgItemMessageW
GetDlgItem
SetWindowTextW
DestroyWindow
GetMenu
GetClientRect
EndPaint
CopyRect
BeginPaint
EnumWindows
GetDesktopWindow
IsWindow
IsWindowEnabled
IsWindowVisible
EnableWindow
GetSysColor
SetClassLongPtrW
IsDialogMessageW
GetSystemMetrics
GetWindowTextLengthW
GetWindowDC
SetMenu
SetCursor
CreateMenu
DestroyMenu
FlashWindow
SetMenuDefaultItem
SetWindowLongW
ScreenToClient
InvalidateRect
GetWindowLongPtrW
GetFocus
GetWindowTextW
EnumChildWindows
CharUpperBuffW
GetWindowThreadProcessId
AttachThreadInput
SendMessageTimeoutW
GetClassNameW
GetParent
GetDlgCtrlID
SendMessageW
MapVirtualKeyW
PostMessageW
GetWindowRect
MessageBoxW
CreatePopupMenu
MessageBoxA
RegisterWindowMessageW
SetTimer
IsZoomed
GetCaretPos
GetSubMenu
GetMenuStringW
IsCharUpperW
IsCharLowerW
IsCharAlphaNumericW
IsCharAlphaW
GetKeyboardLayoutNameW
CountClipboardFormats
SetWindowPos
CloseClipboard
CopyImage
GetClipboardData
SetForegroundWindow
IsClipboardFormatAvailable
DestroyIcon
ShowWindow
CreateWindowExW
RegisterClassExW
LoadIconW
LoadCursorW
GetSysColorBrush
GetForegroundWindow
DefWindowProcW
MoveWindow
SetFocus
PostQuitMessage
KillTimer
AdjustWindowRectEx
SetRect
ClientToScreen
GetKeyState
RegisterHotKey
GetMenuItemCount
gdi32
PolyDraw
BeginPath
Rectangle
SetViewportOrgEx
PolyBezierTo
ExtCreatePen
RoundRect
SetBkColor
CreatePen
CreateSolidBrush
SetTextColor
Ellipse
MoveToEx
AngleArc
LineTo
CloseFigure
SetPixel
EndPath
StrokePath
StrokeAndFillPath
GetObjectW
SetBkMode
GetDeviceCaps
GetTextFaceW
GetStockObject
CreateDCW
CreateCompatibleBitmap
GetPixel
DeleteDC
GetDIBits
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
CreateFontW
GetTextExtentPoint32W
DeleteObject
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
GetUserNameW
RegConnectRegistryW
RegEnumKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
CloseServiceHandle
UnlockServiceDatabase
LockServiceDatabase
OpenSCManagerW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
shell32
DragQueryPoint
ShellExecuteExW
DragQueryFileW
SHBrowseForFolderW
SHFileOperationW
SHGetPathFromIDListW
SHGetDesktopFolder
SHGetMalloc
ExtractIconExW
Shell_NotifyIconW
ShellExecuteW
DragFinish
ole32
OleSetMenuDescriptor
MkParseDisplayName
OleSetContainedObject
CoCreateInstance
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
StringFromCLSID
OleUninitialize
CoTaskMemAlloc
CoTaskMemFree
IIDFromString
StringFromIID
CLSIDFromString
OleInitialize
CreateBindCtx
CLSIDFromProgID
CoInitializeSecurity
CoCreateInstanceEx
CoSetProxyBlanket
oleaut32
LoadRegTypeLi
SafeArrayDestroyDescriptor
SafeArrayDestroyData
SafeArrayAllocData
SafeArrayAllocDescriptorEx
SysAllocString
OleLoadPicture
SafeArrayUnaccessData
SafeArrayAccessData
VarR4FromDec
VariantTimeToSystemTime
VariantClear
VariantCopy
VariantInit
GetActiveObject
Sections
.text Size: 562KB - Virtual size: 561KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ