Static task
static1
Behavioral task
behavioral1
Sample
5db423b9de3acea1199b8a8fc6ae99a3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5db423b9de3acea1199b8a8fc6ae99a3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5db423b9de3acea1199b8a8fc6ae99a3_JaffaCakes118
-
Size
1.2MB
-
MD5
5db423b9de3acea1199b8a8fc6ae99a3
-
SHA1
4ef2b19f0e48a7bcd084091596b8941c9d6f692a
-
SHA256
e9b66c47f7a61a6b8911d870991489231a19088fcced155fc283a68eebd035a7
-
SHA512
40103e732af7dd5a814b167cb9f874582d42495084cd7734d1cd6e5c5748e2b5aecd362f7de0abc257b752a75c652a7761aeb34c71e536ad7635f56c038b708b
-
SSDEEP
12288:iRg0NB6hbWbv2zDWMCkxoTtwuc72+E38ASTS6sggJJAysGToLZg8MUDeOUIokgoL:iRx4DWzkxQtwuc72+qfKSzgdt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5db423b9de3acea1199b8a8fc6ae99a3_JaffaCakes118
Files
-
5db423b9de3acea1199b8a8fc6ae99a3_JaffaCakes118.exe windows:4 windows x86 arch:x86
0505ff6a3684176aa11ef1b1c2b4e5e3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
PlaySoundA
ws2_32
send
gethostbyname
listen
WSAAsyncSelect
bind
htons
socket
closesocket
inet_addr
recvfrom
getpeername
recv
accept
connect
getsockname
ntohs
WSAGetLastError
inet_ntoa
gethostname
kernel32
GlobalHandle
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GetProcessVersion
GetCPInfo
GetOEMCP
SetErrorMode
SizeofResource
GetCurrentDirectoryA
RtlUnwind
TlsAlloc
TlsFree
ExitProcess
RaiseException
HeapAlloc
HeapFree
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetACP
CreateThread
ExitThread
TerminateProcess
HeapSize
HeapReAlloc
SetStdHandle
GetStartupInfoA
GetCommandLineA
GetTempFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
FindNextFileA
GetDiskFreeSpaceA
GetCurrentThread
lstrcmpA
LocalFileTimeToFileTime
SetFileTime
SystemTimeToFileTime
GetFileAttributesA
GetFileTime
GetFileSize
SetThreadPriority
CreateEventA
SuspendThread
FileTimeToLocalFileTime
ResumeThread
SetEvent
GetThreadLocale
FileTimeToSystemTime
GetShortPathNameA
FindFirstFileA
GetStringTypeExA
GetFullPathNameA
SetEndOfFile
FindClose
MoveFileA
FlushFileBuffers
UnlockFile
LockFile
ReadFile
SetFilePointer
WriteFile
MultiByteToWideChar
GetCurrentProcess
DuplicateHandle
InterlockedIncrement
WideCharToMultiByte
InterlockedDecrement
LocalAlloc
FormatMessageA
LocalFree
WaitForSingleObject
lstrcpynA
lstrlenA
LoadLibraryA
MulDiv
SetLastError
LoadResource
FreeLibrary
FindResourceA
GetFileType
lstrcatA
LockResource
GetProfileStringA
GetVersion
lstrcmpiA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalDeleteAtom
GlobalAddAtomA
GlobalFindAtomA
GetProcAddress
lstrcpyA
GetModuleHandleA
SetFileAttributesA
GetVolumeInformationA
SetVolumeLabelA
GlobalUnlock
GlobalAlloc
GlobalLock
CloseHandle
GlobalFree
CreateFileA
GetWindowsDirectoryA
GetDiskFreeSpaceExA
GetDriveTypeA
ReleaseMutex
CreateMutexA
GetLastError
CreateDirectoryA
TerminateThread
GetExitCodeThread
UnhandledExceptionFilter
DeleteFileA
GetModuleFileNameA
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetPrivateProfileIntA
WritePrivateProfileStringA
GetPrivateProfileStringA
Sleep
user32
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
ReleaseDC
DrawTextA
GrayStringA
IsDialogMessageA
SetWindowTextA
ShowWindow
IsWindowEnabled
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
GetMenuCheckMarkDimensions
GetDesktopWindow
CharUpperA
CreateDialogIndirectParamA
GetActiveWindow
EndDialog
ValidateRect
TranslateMessage
GetMessageA
SetRectEmpty
LoadAcceleratorsA
TranslateAcceleratorA
ReleaseCapture
DestroyMenu
SetMenu
ReuseDDElParam
UnpackDDElParam
InvalidateRect
BringWindowToTop
PtInRect
IsZoomed
InflateRect
RedrawWindow
SetCapture
SetCursorPos
DestroyCursor
SetParent
IsRectEmpty
AppendMenuA
DeleteMenu
GetSystemMenu
WindowFromPoint
SetRect
FindWindowA
FillRect
PostQuitMessage
ShowOwnedPopups
MapDialogRect
GetClassNameA
GetSysColorBrush
LoadStringA
InvertRect
GetDCEx
LockWindowUpdate
InsertMenuA
GetMenuStringA
SetActiveWindow
ClientToScreen
GetDC
SetScrollInfo
ShowScrollBar
DispatchMessageA
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
IsChild
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenuItemCount
SendDlgItemMessageA
TrackPopupMenu
SetWindowPlacement
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
DestroyWindow
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetWindow
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetParent
IsClipboardFormatAvailable
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
MessageBoxA
GetWindowLongA
SetWindowLongA
LoadImageA
DestroyIcon
RegisterClipboardFormatA
UpdateWindow
GetAsyncKeyState
SetCursor
IsIconic
LoadIconA
GetForegroundWindow
SetForegroundWindow
LoadMenuA
SetMenuDefaultItem
GetCursorPos
MessageBeep
CopyRect
UnregisterHotKey
LoadBitmapA
GetMenu
GetSubMenu
CheckMenuRadioItem
RegisterHotKey
LoadCursorA
KillTimer
SetTimer
PostMessageA
SendMessageA
EnableWindow
MapWindowPoints
GetSysColor
PeekMessageA
GetScrollInfo
GetScrollRange
IsWindow
SetFocus
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetClientRect
BeginDeferWindowPos
IsWindowVisible
EndDeferWindowPos
ScrollWindow
GetMenuItemID
UnhookWindowsHookEx
SetPropA
GetFocus
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
CharNextA
IsWindowUnicode
gdi32
GetTextExtentPointA
GetClipBox
CreateSolidBrush
SetBkColor
GetObjectA
SetTextColor
SaveDC
DeleteDC
SelectObject
GetStockObject
RestoreDC
SetBkMode
SetMapMode
OffsetViewportOrgEx
SetViewportExtEx
SetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
SelectClipRgn
SetWindowExtEx
IntersectClipRect
ExcludeClipRect
SetTextAlign
CreateDIBitmap
DeleteObject
CreateRectRgn
GetDeviceCaps
CreatePatternBrush
RectVisible
TextOutA
PtVisible
Escape
CreateBitmap
ExtTextOutA
CreateRectRgnIndirect
StretchDIBits
PatBlt
CreateCompatibleBitmap
GetCharWidthA
CreateCompatibleDC
GetTextExtentPoint32A
GetTextMetricsA
CreateFontA
LPtoDP
CombineRgn
CreateFontIndirectA
SetRectRgn
BitBlt
comdlg32
GetFileTitleA
GetSaveFileNameA
GetOpenFileNameA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
SetFileSecurityA
RegDeleteValueA
GetFileSecurityA
RegSetValueA
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
shell32
DragQueryFileA
DragFinish
ExtractIconA
ShellExecuteA
Shell_NotifyIconA
SHFileOperationA
SHGetFileInfoA
comctl32
ImageList_Create
ImageList_AddMasked
ImageList_Destroy
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
ImageList_ReplaceIcon
ord17
wsock32
WSACleanup
WSAStartup
wininet
InternetReadFile
InternetQueryDataAvailable
InternetSetStatusCallback
HttpQueryInfoA
InternetOpenA
FtpSetCurrentDirectoryA
InternetOpenUrlA
InternetGetLastResponseInfoA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetConnectA
InternetCloseHandle
FtpOpenFileA
FtpCreateDirectoryA
InternetSetFilePointer
InternetWriteFile
Sections
.text Size: 428KB - Virtual size: 428KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 236KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 400KB - Virtual size: 400KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sec Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE