Static task
static1
Behavioral task
behavioral1
Sample
5dd52d3e178948d299184d207f93730f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5dd52d3e178948d299184d207f93730f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5dd52d3e178948d299184d207f93730f_JaffaCakes118
-
Size
2.7MB
-
MD5
5dd52d3e178948d299184d207f93730f
-
SHA1
c011b9eb439749a6b7ec3b8fcd6edf8644acbf8f
-
SHA256
0bd36627c28274849cc97baffd6e3a55dc44a07c0cf443d43fa3c7b34137e4ab
-
SHA512
a460e70cf320b22a4b21b66a49bf28e8a5739df0985768ee4f7dbb171e1867137b9d076e9117ec31d1c9f44873b49b4d3086011699cff128a716941e5bba6ad3
-
SSDEEP
24576:xh1fvy9LbWzI5UANH+6dTrTZsveBrhvkfnO9:13y9LKzYNeUTPdyO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5dd52d3e178948d299184d207f93730f_JaffaCakes118
Files
-
5dd52d3e178948d299184d207f93730f_JaffaCakes118.exe windows:4 windows x86 arch:x86
8bfee9ee8031fd57b167f22a6a4b669b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
HeapAlloc
ExitProcess
HeapReAlloc
VirtualQuery
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
SetStdHandle
GetFileType
HeapSize
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
GetACP
IsValidCodePage
LCMapStringA
SetUnhandledExceptionFilter
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
UnhandledExceptionFilter
TerminateProcess
CreateThread
ExitThread
GetFileTime
GetFileAttributesA
FileTimeToLocalFileTime
SetErrorMode
GetOEMCP
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
FileTimeToSystemTime
WritePrivateProfileStringA
GetTickCount
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
InterlockedDecrement
GetModuleFileNameW
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
SuspendThread
SetThreadPriority
GetCurrentProcessId
FormatMessageA
LocalFree
GetThreadLocale
InterlockedIncrement
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
CreateFileA
GetFileSize
ReadFile
WriteFile
GetCPInfo
GetVersionExA
lstrcpynA
SetLastError
FreeLibrary
lstrlenW
GetVersion
CompareStringW
CompareStringA
InterlockedExchange
lstrcmpiA
IsDebuggerPresent
VirtualFree
VirtualProtect
VirtualAlloc
GetSystemInfo
CreateMutexA
GlobalAlloc
ResetEvent
SetEvent
WaitForSingleObject
MulDiv
GlobalUnlock
GlobalLock
CloseHandle
LockResource
CreateEventA
FreeResource
SizeofResource
LoadResource
FindResourceA
ResumeThread
GetLastError
WaitForMultipleObjects
lstrlenA
Sleep
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
WideCharToMultiByte
InitializeCriticalSection
MultiByteToWideChar
OutputDebugStringA
GlobalFree
GetTempPathA
GetModuleHandleA
GetModuleFileNameA
GetProcAddress
LoadLibraryA
LCMapStringW
GetLocalTime
user32
MessageBeep
GetDCEx
LockWindowUpdate
SetParent
SetWindowContextHelpId
MapDialogRect
RegisterClipboardFormatA
CreateDialogIndirectParamA
EndDialog
PostQuitMessage
EndPaint
BeginPaint
GetWindowDC
GetMessageA
TranslateMessage
ValidateRect
GetWindowThreadProcessId
GetMenuStringA
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
EnableMenuItem
CheckMenuItem
CharNextA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetNextDlgGroupItem
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
GetMenu
CreateWindowExA
GetClassInfoExA
RegisterClassA
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetDlgCtrlID
CallWindowProcA
SetWindowLongA
SetWindowPos
IntersectRect
GetWindowPlacement
GetWindow
GetNextDlgTabItem
IsWindowVisible
DrawStateA
IsMenu
FrameRect
DefWindowProcA
GetClassInfoA
LoadImageA
EnableWindow
KillTimer
GetSysColor
SetTimer
SetCursor
GetParent
GetActiveWindow
WindowFromPoint
ClientToScreen
SystemParametersInfoA
ModifyMenuA
GetMenuItemInfoA
GetSubMenu
GetMenuItemCount
CreatePopupMenu
CreateMenu
GetDesktopWindow
DestroyIcon
GetMenuItemID
DrawIconEx
GetMenuState
GetSysColorBrush
DrawEdge
IsWindow
PostThreadMessageA
UnregisterClassA
ReleaseCapture
SetCapture
OffsetRect
GetFocus
PtInRect
ScreenToClient
InvalidateRgn
IsRectEmpty
CopyAcceleratorTableA
SetRectEmpty
GetMessageTime
DestroyMenu
GetWindowRect
InvalidateRect
UpdateWindow
RedrawWindow
SetRect
FillRect
GetDC
ReleaseDC
CopyRect
DrawIcon
SendMessageA
AppendMenuA
FindWindowA
LoadIconA
LoadBitmapA
IsIconic
GetSystemMenu
GetSystemMetrics
GetClientRect
MessageBoxA
CharUpperA
PostMessageA
RegisterWindowMessageA
InflateRect
GetCursor
LoadCursorA
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
GetWindowLongA
GetCursorPos
GetPropA
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
GetWindowExtEx
CreateRectRgnIndirect
SetRectRgn
CombineRgn
GetMapMode
GetCharWidthA
StretchDIBits
GetRgnBox
GetViewportExtEx
CreateRectRgn
SelectClipRgn
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
SetMapMode
SetBkMode
CreatePatternBrush
CreateSolidBrush
RestoreDC
SaveDC
GetTextColor
GetClipBox
RoundRect
SetTextColor
SetBkColor
CreateBitmap
CreateFontA
GetBkMode
GetTextExtentPoint32W
PatBlt
CreatePen
SetPixel
GetPixel
CreateDIBSection
Ellipse
Rectangle
GetBkColor
Escape
StretchBlt
GetCurrentObject
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetTextExtentPoint32A
DeleteDC
SelectObject
GetDeviceCaps
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
DeleteObject
CreateFontIndirectA
GetStockObject
GetObjectA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegCreateKeyExA
RegCloseKey
RegQueryValueA
RegOpenKeyA
RegOpenKeyExA
RegEnumKeyA
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
shell32
ShellExecuteA
comctl32
_TrackMouseEvent
InitCommonControlsEx
shlwapi
PathIsUNCA
PathFindExtensionA
PathStripToRootA
PathFindFileNameA
oledlg
ord8
ole32
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CoTaskMemAlloc
CoTaskMemFree
CreateStreamOnHGlobal
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
OleLoadPicture
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
OleCreateFontIndirect
SysStringLen
SysFreeString
SysAllocStringByteLen
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
SysAllocString
Sections
.text Size: 464KB - Virtual size: 463KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ