Static task
static1
Behavioral task
behavioral1
Sample
5e420411eb56ead1424f052f32b86b16_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5e420411eb56ead1424f052f32b86b16_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5e420411eb56ead1424f052f32b86b16_JaffaCakes118
-
Size
187KB
-
MD5
5e420411eb56ead1424f052f32b86b16
-
SHA1
1f0f497882c79e6a07db94f6708597e5214025db
-
SHA256
c32b445bc75affd3b75aecb3c6c432c72e3f944b04454d363617fb68cea291bd
-
SHA512
5894e7ec0d100581f950ecfae2ac116e93314314a8f8c8b01fe4a05c3ff04b8578f2c018934c6b5b964330ee647b4ed25b1b3f84332dd75fb855b6fde17cb475
-
SSDEEP
3072:LLDkECxzYvy7EANiAm1vH9LPewj9MxVCkCn28k/ciGlHoOMzvsLTcZ//:LLPClYvyQANbm1fl2wj9MnCkC22roSLW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5e420411eb56ead1424f052f32b86b16_JaffaCakes118
Files
-
5e420411eb56ead1424f052f32b86b16_JaffaCakes118.exe windows:5 windows x86 arch:x86
e47a7459459da3e52785ec87f154f6e5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadReadPtr
SetFileTime
VirtualQueryEx
OpenProcess
Thread32First
WideCharToMultiByte
ReadProcessMemory
HeapDestroy
HeapCreate
lstrcpynW
Thread32Next
GetTimeZoneInformation
MultiByteToWideChar
lstrlenW
GetTempPathW
GetFileSizeEx
OpenMutexW
GetLastError
VirtualProtectEx
VirtualAllocEx
FindClose
RemoveDirectoryW
QueryDosDeviceW
WaitForMultipleObjects
FindNextFileW
VirtualProtect
CreateToolhelp32Snapshot
FileTimeToLocalFileTime
GetVolumeNameForVolumeMountPointW
DeleteFileW
GetFileInformationByHandle
GetProcessHeap
SetFileAttributesW
GetCommandLineW
SetErrorMode
GetComputerNameW
GetModuleFileNameW
CreateEventW
GetModuleHandleA
OpenEventW
DuplicateHandle
GetCurrentProcessId
CreateRemoteThread
Process32FirstW
Process32NextW
lstrcmpiA
WTSGetActiveConsoleSessionId
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
TlsAlloc
TlsFree
GlobalLock
GlobalUnlock
MoveFileExW
GetUserDefaultUILanguage
GetLocalTime
FlushFileBuffers
CreateFileW
GetFileAttributesW
GetModuleHandleW
Sleep
GetSystemTime
GetFileAttributesExW
GetProcessId
EnterCriticalSection
CreateDirectoryW
HeapFree
GetLogicalDriveStringsW
SetFilePointerEx
GetCurrentProcess
SystemTimeToFileTime
HeapAlloc
SetEndOfFile
FindFirstFileW
CreateMutexW
HeapReAlloc
GetTempFileNameW
FileTimeToDosDateTime
GetEnvironmentVariableW
VirtualFree
WriteProcessMemory
CreateThread
VirtualAlloc
LeaveCriticalSection
VirtualFreeEx
InitializeCriticalSection
SetThreadContext
GetThreadContext
ExitProcess
CloseHandle
CreatePipe
ExitThread
ReadFile
WriteFile
SetHandleInformation
CreateProcessW
ReleaseMutex
GetCurrentThreadId
SetLastError
GetTickCount
ResetEvent
SetThreadPriority
FreeLibrary
TerminateProcess
TlsSetValue
GetCurrentThread
SetEvent
WaitForSingleObject
TlsGetValue
GetVersionExW
GetNativeSystemInfo
lstrcmpiW
LoadLibraryA
ExpandEnvironmentStringsW
LocalFree
GetProcAddress
GetPrivateProfileIntW
LoadLibraryW
GetPrivateProfileStringW
GetFileTime
user32
GetClipboardData
GetKeyboardState
GetSystemMetrics
MsgWaitForMultipleObjects
WindowFromPoint
CharToOemW
TranslateMessage
CharLowerA
CharUpperW
SetWindowLongW
GetWindow
DispatchMessageW
CharLowerBuffA
CharLowerW
CreateDesktopW
SetProcessWindowStation
ToUnicode
CloseWindowStation
CreateWindowStationW
OpenDesktopW
CloseDesktop
SetThreadDesktop
GetUserObjectInformationW
OpenWindowStationW
MapVirtualKeyW
GetMessageA
GetWindowRect
MessageBoxA
GetParent
GetClassLongW
GetCapture
SetCursorPos
GetWindowLongW
GetAncestor
PeekMessageW
PeekMessageA
RegisterWindowMessageW
GetMenuItemID
SetKeyboardState
GetSubMenu
DefDlgProcW
DefFrameProcA
MenuItemFromPoint
GetMenu
RegisterClassExW
GetMenuItemRect
TrackPopupMenuEx
SystemParametersInfoW
GetClassNameW
GetMenuState
DefWindowProcA
DefMDIChildProcW
SwitchDesktop
GetMenuItemCount
DefDlgProcA
DefMDIChildProcA
HiliteMenuItem
RegisterClassW
CallWindowProcA
EndMenu
CallWindowProcW
DefFrameProcW
RegisterClassA
GetShellWindow
RegisterClassExA
DestroyWindow
LoadCursorW
OpenInputDesktop
GetThreadDesktop
LoadIconW
SetWindowPos
SendMessageTimeoutW
IsWindow
CreateWindowExA
ShowWindow
UpdateWindow
ReleaseCapture
MapWindowPoints
GetMessagePos
GetWindowThreadProcessId
EndPaint
GetUpdateRgn
GetMessageW
GetWindowDC
FillRect
PostMessageW
GetWindowInfo
DrawEdge
BeginPaint
GetUpdateRect
GetDC
IntersectRect
GetDCEx
ReleaseDC
PostThreadMessageW
GetKeyboardLayoutList
ExitWindowsEx
GetTopWindow
SetCapture
LoadImageW
EqualRect
PrintWindow
SendMessageW
DefWindowProcW
IsRectEmpty
DrawIcon
GetIconInfo
GetCursorPos
GetProcessWindowStation
advapi32
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
ConvertSidToStringSidW
CreateProcessAsUserA
CreateProcessAsUserW
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
GetSecurityDescriptorSacl
CryptGetHashParam
OpenProcessToken
GetSidSubAuthority
CryptAcquireContextW
OpenThreadToken
GetSidSubAuthorityCount
GetTokenInformation
RegCreateKeyExW
CryptReleaseContext
RegQueryValueExW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetNamedSecurityInfoW
LookupPrivilegeValueW
CryptCreateHash
SetSecurityDescriptorSacl
CryptDestroyHash
AdjustTokenPrivileges
RegSetValueExW
CryptHashData
InitiateSystemShutdownExW
IsWellKnownSid
GetLengthSid
EqualSid
shlwapi
PathAddExtensionW
StrCmpNIW
PathRenameExtensionW
PathIsURLW
wvnsprintfA
StrCmpNIA
PathMatchSpecW
PathRemoveBackslashW
PathUnquoteSpacesW
StrStrIA
PathCombineW
SHDeleteKeyW
PathSkipRootW
SHDeleteValueW
PathAddBackslashW
PathFindFileNameW
PathIsDirectoryW
wvnsprintfW
UrlUnescapeA
PathQuoteSpacesW
StrStrIW
PathRemoveFileSpecW
shell32
CommandLineToArgvW
ShellExecuteW
SHGetFolderPathW
secur32
GetUserNameExW
ole32
CLSIDFromString
StringFromGUID2
CoInitializeEx
CoUninitialize
CoCreateInstance
gdi32
RestoreDC
CreateCompatibleDC
SetRectRgn
SelectObject
DeleteObject
GdiFlush
DeleteDC
SetViewportOrgEx
CreateCompatibleBitmap
GetDIBits
GetDeviceCaps
CreateDIBSection
GetStockObject
SaveDC
ws2_32
recvfrom
getpeername
accept
listen
send
closesocket
WSASetLastError
socket
inet_addr
WSASend
gethostbyname
WSAEventSelect
getaddrinfo
select
getsockname
sendto
recv
freeaddrinfo
setsockopt
shutdown
WSAGetLastError
WSAStartup
WSAAddressToStringW
WSAIoctl
connect
bind
crypt32
PFXExportCertStoreEx
CertDuplicateCertificateContext
CertEnumCertificatesInStore
PFXImportCertStore
CertCloseStore
CertOpenSystemStoreW
CertDeleteCertificateFromStore
CryptUnprotectData
wininet
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
InternetOpenA
InternetSetOptionA
HttpOpenRequestW
HttpAddRequestHeadersW
InternetSetStatusCallbackW
GetUrlCacheEntryInfoW
HttpSendRequestW
InternetReadFileExA
InternetQueryDataAvailable
HttpSendRequestExW
HttpSendRequestExA
InternetQueryOptionA
InternetCrackUrlA
InternetReadFile
InternetQueryOptionW
HttpQueryInfoA
InternetConnectA
InternetCloseHandle
oleaut32
SysFreeString
VariantInit
SysAllocString
VariantClear
netapi32
NetUserEnum
NetApiBufferFree
NetUserGetInfo
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
winmm
PlaySoundW
waveOutSetVolume
waveOutGetVolume
PlaySoundA
Sections
.text Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ