MyCopyMemory
Static task
static1
Behavioral task
behavioral1
Sample
4dde0918d53db7669227c39361d9ae23_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4dde0918d53db7669227c39361d9ae23_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4dde0918d53db7669227c39361d9ae23_JaffaCakes118
-
Size
835KB
-
MD5
4dde0918d53db7669227c39361d9ae23
-
SHA1
9e38c061d851f314b13c15faac152f784880502b
-
SHA256
6ca779ef0a4f521968a0f2571b2865d0173fbf0cfe5e1300ce41e126a4bb847a
-
SHA512
842d5310e4438f952345ac3293f15e5cc82b26c25114f36c2bd6841befd7095a5fedf776e690bb029f6f84b06a1f5323c2464778239ab42f78547dd9a6b4d58d
-
SSDEEP
24576:6/Sw2JfOqUEjFRmRG/uITCREZYnh17+xYKzrE:6/SwcOijFRA+e+Z8hE9v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4dde0918d53db7669227c39361d9ae23_JaffaCakes118
Files
-
4dde0918d53db7669227c39361d9ae23_JaffaCakes118.exe windows:5 windows x86 arch:x86
6e9776db308968370d9eb5e7a02ebd2c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeW
HeapAlloc
GetProcAddress
VirtualProtect
SetUnhandledExceptionFilter
GetCurrentProcess
OpenEventW
WaitForSingleObject
DuplicateHandle
GlobalHandle
SetLastError
FlushFileBuffers
GetCurrentDirectoryW
LocalAlloc
GlobalLock
CreateEventW
HeapFree
FindResourceA
RaiseException
SetThreadPriority
GetStartupInfoW
InterlockedExchange
LCMapStringW
GetPrivateProfileStringW
GlobalFlags
SetHandleCount
HeapDestroy
DisconnectNamedPipe
SearchPathW
GetLastError
lstrcmpiW
VirtualFree
lstrcmpW
GetCommandLineW
GetFileSizeEx
UnhandledExceptionFilter
HeapQueryInformation
GetFileAttributesW
ReadFile
GetConsoleOutputCP
GetWindowsDirectoryW
GetOverlappedResult
CreateDirectoryW
EnterCriticalSection
lstrcpyW
GetFileAttributesExW
LoadResource
GetVersion
FreeEnvironmentStringsW
GetConsoleTitleA
GetTickCount
TerminateProcess
GlobalFindAtomW
GetTempFileNameW
lstrcmpA
GetLocaleInfoW
GetProfileIntW
PeekNamedPipe
LoadLibraryA
GetCPInfo
GetCurrentThreadId
GlobalAlloc
FindFirstFileW
SetFilePointer
GetUserDefaultUILanguage
IsDebuggerPresent
FreeLibrary
ExitProcess
GetOEMCP
CompareStringW
FreeResource
CreateFileW
LocalFree
user32
DrawTextExW
ClientToScreen
BeginPaint
CreateWindowExW
SetCursor
GetSysColorBrush
RegisterWindowMessageW
ValidateRect
SendDlgItemMessageW
SystemParametersInfoW
GetSystemMenu
GetDoubleClickTime
GetPropW
DestroyCursor
MapWindowPoints
GetUpdateRect
IsChild
ShowOwnedPopups
EndDeferWindowPos
DefMDIChildProcW
ExitWindowsEx
GetParent
TabbedTextOutW
GetMessageW
SetRectEmpty
SetRect
TrackPopupMenu
SetClipboardData
EqualRect
ToUnicodeEx
GetNextDlgGroupItem
FrameRect
GetWindowLongW
UnregisterClassW
PostThreadMessageW
GetFocus
UnregisterClassA
CopyAcceleratorTableW
UnhookWindowsHookEx
SetActiveWindow
PeekMessageW
GetMenuDefaultItem
gdi32
OffsetRgn
GetBoundsRect
ScaleViewportExtEx
StretchDIBits
Escape
RectVisible
Rectangle
RestoreDC
Polygon
SetTextAlign
GetClipBox
CombineRgn
DeleteObject
GetTextCharsetInfo
SetDIBColorTable
Ellipse
SelectPalette
SetWindowOrgEx
SetTextColor
SetWindowExtEx
SetROP2
SetBkColor
EnumFontFamiliesExW
ExcludeClipRect
GetLayout
ExtFloodFill
SetPixelV
LPtoDP
SetPixel
SetBkMode
GetBkMode
GetStockObject
SetMapMode
GetWindowOrgEx
advapi32
RegEnumValueW
GetSecurityDescriptorSacl
RegQueryValueW
OpenProcessToken
RegSetValueExW
RegDeleteValueW
InitializeSecurityDescriptor
CheckTokenMembership
AdjustTokenPrivileges
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegEnumKeyExW
FreeSid
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyW
SetSecurityDescriptorSacl
LookupPrivilegeValueW
SetSecurityDescriptorDacl
RegCloseKey
RegOpenKeyExW
AllocateAndInitializeSid
GetTokenInformation
RegQueryValueExW
shell32
SHGetDiskFreeSpaceExW
SHChangeNotify
DragFinish
SHAppBarMessage
SHGetSpecialFolderPathW
SHBrowseForFolderW
DragQueryFileW
SHGetFolderPathW
SHGetFolderLocation
SHGetFileInfoW
ShellExecuteW
Shell_NotifyIconW
SHGetDesktopFolder
SHGetSpecialFolderLocation
ShellExecuteExW
DuplicateIcon
SHGetPathFromIDListW
ole32
CoLockObjectExternal
IsAccelerator
OleFlushClipboard
RevokeDragDrop
OleLockRunning
OleDuplicateData
DoDragDrop
OleCreateMenuDescriptor
OleTranslateAccelerator
OleIsCurrentClipboard
CoRevokeClassObject
CoInitializeEx
CLSIDFromString
OleDestroyMenuDescriptor
CreateStreamOnHGlobal
CoRegisterMessageFilter
OleInitialize
OleGetClipboard
CoFreeUnusedLibraries
OleUninitialize
CoCreateGuid
ReleaseStgMedium
CoUninitialize
CoInitialize
CoCreateInstance
CoTaskMemAlloc
RegisterDragDrop
CoTaskMemFree
oleaut32
VariantClear
SystemTimeToVariantTime
VariantTimeToSystemTime
SysStringByteLen
SysFreeString
SysAllocStringLen
SysAllocString
SysAllocStringByteLen
VariantChangeType
VariantInit
VarBstrCmp
VarBstrCat
SysStringLen
VarBstrFromDate
shlwapi
PathStripToRootW
PathIsUNCW
PathFindExtensionW
PathFindFileNameW
ord345
PathRemoveFileSpecW
winmm
PlaySoundW
msimg32
TransparentBlt
AlphaBlend
mpr
WNetAddConnection3W
imm32
ImmReleaseContext
ImmGetOpenStatus
ImmGetContext
oledlg
OleUIBusyW
gdiplus
GdiplusStartup
GdipCreateBitmapFromScan0
GdipAlloc
GdipBitmapLockBits
GdipCloneImage
GdipDeleteGraphics
GdipGetImageHeight
GdipBitmapUnlockBits
GdipCreateBitmapFromStream
GdipGetImagePalette
GdipDisposeImage
GdipFree
GdipCreateBitmapFromHBITMAP
GdipGetImageGraphicsContext
GdipGetImagePixelFormat
GdipDrawImageRectI
GdipGetImageWidth
GdipCreateFromHDC
GdiplusShutdown
GdipDrawImageI
GdipSetInterpolationMode
GdipGetImagePaletteSize
oleacc
AccessibleObjectFromWindow
LresultFromObject
CreateStdAccessibleObject
Exports
Exports
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.55 Size: - Virtual size: 26KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 828B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qew Size: 285KB - Virtual size: 285KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tew Size: 159KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vew Size: 159KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dew Size: 212KB - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 712B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ