Static task
static1
Behavioral task
behavioral1
Sample
5ab8096caec50102b2d1b4e08e16efad_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5ab8096caec50102b2d1b4e08e16efad_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5ab8096caec50102b2d1b4e08e16efad_JaffaCakes118
-
Size
26KB
-
MD5
5ab8096caec50102b2d1b4e08e16efad
-
SHA1
af79723a02dff328ce69627422bc29b8725263cb
-
SHA256
4f2c896fb90f5f22857661c4d8d4481bb54df2368b97d3344c7d96927d482809
-
SHA512
995b2f178c4f1b75de0421b7dd85836f4ecec0dbed633ad6840c5d87ca689ff938c4121961ff9d9f2445ac59b94de1c2827d00a066e54bff92a4e7bc57732c21
-
SSDEEP
768:fYjPpRrwaYpQPk5ctMidcowO497tYa3W3T:fADwao0tMiOO4o3T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5ab8096caec50102b2d1b4e08e16efad_JaffaCakes118
Files
-
5ab8096caec50102b2d1b4e08e16efad_JaffaCakes118.exe windows:4 windows x86 arch:x86
6f1e3e765e29ed0eeae0378103798f3e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlAddAccessAllowedObjectAce
NtQueryTimerResolution
RtlAdjustPrivilege
NtQuerySemaphore
gdi32
GetTextExtentPointW
CreateFontIndirectW
GetDeviceCaps
GetTextMetricsW
GetBkColor
DeleteDC
CreateCompatibleDC
SetStretchBltMode
SetBkColor
StretchBlt
GetPixel
SelectObject
ExtTextOutW
SetBkMode
GetObjectW
SetTextColor
DeleteObject
PatBlt
CreateBitmap
BitBlt
user32
SetCursor
ShowWindow
EnableWindow
LoadBitmapW
GetDialogBaseUnits
IsDlgButtonChecked
EndDialog
ValidateRect
MapWindowPoints
MessageBoxW
GetDC
MoveWindow
SetWindowTextW
GetSubMenu
IsDialogMessageW
DrawTextW
SetParent
EnableMenuItem
SetFocus
CheckMenuItem
TranslateMessage
GetSysColorBrush
PostMessageW
GetClassLongW
GetClientRect
GetDlgItem
SendMessageW
SetTimer
LoadIconW
DestroyWindow
SetWindowLongW
GetMenuItemID
IsWindowEnabled
GetScrollInfo
UpdateWindow
LoadMenuW
InvalidateRect
GetParent
GetCursorPos
DestroyMenu
PtInRect
ScreenToClient
SetScrollInfo
PostThreadMessageW
LoadStringW
SetRectEmpty
SendDlgItemMessageW
CreateDialogParamW
OffsetRect
wsprintfW
WinHelpW
TrackPopupMenu
GetWindowRect
CheckRadioButton
DispatchMessageW
MsgWaitForMultipleObjects
GetSysColor
DialogBoxParamW
SetDlgItemTextW
ClientToScreen
GetWindowLongW
GetWindowTextW
GetWindowTextLengthW
EndPaint
DefDlgProcW
KillTimer
GetClassInfoExW
CallWindowProcW
InflateRect
IsWindow
BeginPaint
DefWindowProcW
CheckDlgButton
RegisterClassExW
GetMenuItemCount
SetClassLongW
GetActiveWindow
FindWindowExW
RedrawWindow
PeekMessageW
ReleaseDC
LoadCursorW
CreateWindowExW
SetWindowPos
ddraw
DirectDrawCreate
ole32
StringFromIID
CoUninitialize
CoCreateInstance
StringFromGUID2
CoTaskMemAlloc
CoInitializeEx
CoTaskMemFree
CLSIDFromString
comctl32
PropertySheetW
ImageList_Destroy
ImageList_SetOverlayImage
ImageList_LoadImageW
CreatePropertySheetPageW
InitCommonControlsEx
ImageList_Draw
shell32
ShellExecuteW
kernel32
DisableThreadLibraryCalls
FindResourceW
GetLastError
GetCurrentThreadId
OutputDebugStringW
DeleteCriticalSection
EnterCriticalSection
HeapFree
InterlockedIncrement
LocalFree
GetCurrentProcess
CreateThread
GetLocalTime
lstrlenA
GetProcessHeap
HeapAlloc
InitializeCriticalSection
lstrcmpW
GlobalSize
LoadResource
InterlockedDecrement
GlobalLock
TerminateThread
GetModuleHandleW
WaitForSingleObject
IsBadWritePtr
GlobalAlloc
IsBadReadPtr
MulDiv
CloseHandle
TryEnterCriticalSection
CreateEventW
VirtualAlloc
LeaveCriticalSection
IsBadStringPtrW
ResetEvent
GetWindowsDirectoryW
LockResource
FlushInstructionCache
GlobalUnlock
Sleep
MultiByteToWideChar
GetCurrentThread
lstrlenW
GetLocaleInfoW
SetEvent
GlobalFree
LocalAlloc
GetTickCount
PulseEvent
lstrcpyW
advapi32
RegOpenKeyExW
GetTokenInformation
GetLengthSid
GetSecurityDescriptorLength
AddAce
MapGenericMask
MakeSelfRelativeSD
RegQueryValueExW
OpenThreadToken
GetSidSubAuthorityCount
GetAce
GetSidIdentifierAuthority
RegCloseKey
GetAclInformation
SetSecurityDescriptorSacl
RegCreateKeyExW
AddAccessAllowedAce
GetSecurityDescriptorOwner
RegDeleteValueW
SetSecurityDescriptorOwner
GetUserNameW
RegSetValueExW
InitializeAcl
GetSecurityDescriptorGroup
OpenProcessToken
GetSidSubAuthority
RegEnumKeyExW
LookupAccountNameW
RegDeleteKeyW
IsValidSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
LookupAccountSidW
GetSecurityDescriptorControl
GetSidLengthRequired
SetSecurityDescriptorGroup
GetSecurityDescriptorDacl
InitializeSid
rtutils
TraceDumpExA
msvcrt
_purecall
_wtoi
wcscspn
free
wcscmp
_onexit
_wcsupr
_initterm
wcsncpy
realloc
wcstol
wcspbrk
wcslen
wcscpy
_adjust_fdiv
wcscat
_wcsicoll
_snwprintf
__dllonexit
wcsncmp
_wcsicmp
__CxxFrameHandler
_wtol
_ltow
swprintf
wcsstr
wcschr
wcsncat
malloc
wcsspn
_ftol
wcstoul
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE