Static task
static1
Behavioral task
behavioral1
Sample
59fd5692596889c22d573a5fa2d2789c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
59fd5692596889c22d573a5fa2d2789c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
59fd5692596889c22d573a5fa2d2789c_JaffaCakes118
-
Size
231KB
-
MD5
59fd5692596889c22d573a5fa2d2789c
-
SHA1
dd2fd3640a320e656fb8a34b81630af5ce21aa93
-
SHA256
29f6eb26c87999fd2f33f7d8f7e87dbe256641317a6e484787b3ffa9add20910
-
SHA512
8c1d00e1a6f9ba8af4a9f7e88c049d06d6fbee98c0151fba31075c225648f6c0f832b268df724ade1c80fcc97f45847c84b90b7626129feea8c916d16af9f3a9
-
SSDEEP
3072:l2UcEsjkckAxq1zg3wwroOmagSAsR24Bz5FDabwDs8D7ApHAUpeo:UU1swckAxWg3DqagSMEub4Dil
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 59fd5692596889c22d573a5fa2d2789c_JaffaCakes118
Files
-
59fd5692596889c22d573a5fa2d2789c_JaffaCakes118.exe windows:5 windows x86 arch:x86
20f0ae0db529e8714e18b04db772a96c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RaiseException
RtlUnwind
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
VirtualAlloc
Sleep
ExitProcess
HeapReAlloc
HeapSize
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
SetErrorMode
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetOEMCP
GetCPInfo
CreateFileA
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
GlobalFlags
InterlockedIncrement
GetModuleHandleW
InterlockedDecrement
GetModuleFileNameW
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
WritePrivateProfileStringA
GetCurrentProcessId
GlobalAddAtomA
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
LoadLibraryA
CompareStringA
InterlockedExchange
lstrcmpA
FreeLibrary
GetModuleHandleA
GetProcAddress
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MultiByteToWideChar
lstrlenA
GetLastError
SetLastError
GetVolumeInformationA
CreateProcessA
FindFirstFileA
FindClose
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
OpenProcess
FindResourceA
LoadResource
LockResource
FreeEnvironmentStringsW
SizeofResource
user32
UnregisterClassA
DestroyMenu
LoadCursorA
GetSysColorBrush
ShowWindow
SetWindowTextA
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetWindowTextA
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
IsWindow
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
SendMessageA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
EnableWindow
FillRect
SetCursor
GetCursorPos
SetCursorPos
GetSystemMetrics
GetClientRect
PostMessageA
PostQuitMessage
gdi32
DeleteDC
GetStockObject
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
DeleteObject
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
CreateSolidBrush
RectVisible
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegQueryInfoKeyA
GetUserNameA
CreateProcessAsUserA
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
ws2_32
WSACleanup
WSAStartup
WSASetLastError
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ