Static task
static1
Behavioral task
behavioral1
Sample
5fe403299c9e9c54cba3cc3fecf474a9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5fe403299c9e9c54cba3cc3fecf474a9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5fe403299c9e9c54cba3cc3fecf474a9_JaffaCakes118
-
Size
1.7MB
-
MD5
5fe403299c9e9c54cba3cc3fecf474a9
-
SHA1
21d25a420657eb9a3bb9898a9d6498e3af5e32b8
-
SHA256
7255ccb35f938388bd15ffbbc0ad7f7937dcb2d9c3aeb5be1a8915a9c30ffdd6
-
SHA512
e2c1fe4b8ebf768f3c67af7d83a955a32651e83a7b98f2d22233d5e1836ccfd485d75e1088c3ad4b8d077e5d18a9bff70f1406f84235bc16a0e76dce477a4f5a
-
SSDEEP
12288:21hj5dRskb2EO4mGoQdStBYA3Hn4paYwDIbwVK/qimebWEl:2P5Lskb2EqGbnkIbwVWqimebWE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5fe403299c9e9c54cba3cc3fecf474a9_JaffaCakes118
Files
-
5fe403299c9e9c54cba3cc3fecf474a9_JaffaCakes118.exe windows:4 windows x86 arch:x86
ce4c6ec91787cf354b5541a06b7d5e17
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFindExtensionA
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindOnPathA
SHDeleteKeyA
PathFileExistsA
mpr
WNetGetUserA
shfolder
SHGetFolderPathA
msimg32
TransparentBlt
iphlpapi
GetIfTable
kernel32
GetFileType
ExitThread
CreateThread
TerminateProcess
HeapSize
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetUnhandledExceptionFilter
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetCurrentProcessId
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
SetStdHandle
HeapReAlloc
ExitProcess
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
SizeofResource
LockResource
LoadResource
FindResourceA
WideCharToMultiByte
HeapFree
HeapAlloc
GetLastError
GetCurrentProcess
GetModuleFileNameA
CloseHandle
CreateFileA
DeleteFileA
GetLogicalDriveStringsA
GetSystemTime
ExpandEnvironmentStringsA
FileTimeToSystemTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
GetFileAttributesA
GetFileSize
FindNextFileA
WaitForSingleObject
lstrlenA
FreeLibrary
LoadLibraryA
Sleep
LocalFree
FormatMessageA
GetVersion
GetCommandLineA
GetStartupInfoA
VirtualQuery
GetSystemInfo
VirtualAlloc
GetDateFormatA
GetTimeFormatA
GetDriveTypeA
GetSystemTimeAsFileTime
RtlUnwind
GetCurrentDirectoryA
WritePrivateProfileStringA
SetErrorMode
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GlobalFlags
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetFileTime
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GetFullPathNameA
lstrcpyA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
lstrcmpA
DeleteCriticalSection
InitializeCriticalSection
RaiseException
InterlockedDecrement
SetLastError
MulDiv
GlobalAlloc
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
lstrcpynA
GetModuleHandleA
GlobalLock
GlobalUnlock
FreeResource
GlobalFree
VirtualProtect
GetProcAddress
CompareStringW
CompareStringA
lstrcmpiA
CreateMutexA
GetVolumeInformationA
MultiByteToWideChar
TerminateThread
CreateDirectoryA
GetTickCount
user32
PostThreadMessageA
RegisterClipboardFormatA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
CopyAcceleratorTableA
CharNextA
GetSysColorBrush
DestroyMenu
SetWindowContextHelpId
PostQuitMessage
GetMessageA
ValidateRect
wsprintfA
GetWindowDC
ReleaseDC
GetDC
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
SetWindowTextA
WinHelpA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
MessageBoxA
GetKeyState
FillRect
GetClientRect
EnableWindow
GetWindowRect
SetTimer
GetParent
SystemParametersInfoA
TranslateMessage
IsDialogMessageA
DispatchMessageA
PeekMessageA
SetCursor
CopyRect
LoadBitmapA
GetMenu
GetMenuItemCount
ScreenToClient
GetClassInfoA
RegisterClassA
UnregisterClassA
DefWindowProcA
CallWindowProcA
IntersectRect
GetWindowPlacement
GetDesktopWindow
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
EndDialog
MapDialogRect
SetWindowPos
GetCapture
GetActiveWindow
GetFocus
SetFocus
GetWindowLongA
GetDlgItem
IsWindowEnabled
GrayStringA
DrawTextExA
TabbedTextOutA
RegisterWindowMessageA
TrackPopupMenu
GetClassNameA
SetMenuDefaultItem
SetActiveWindow
PostMessageA
LoadMenuA
GetSubMenu
GetMenuItemID
CharUpperA
EqualRect
SetRect
BeginPaint
EndPaint
ClientToScreen
AdjustWindowRectEx
UpdateWindow
InvalidateRect
LoadCursorA
IsRectEmpty
InflateRect
GetSysColor
PtInRect
OffsetRect
SendMessageA
RedrawWindow
KillTimer
SetCapture
ReleaseCapture
IsWindow
GetCursorPos
SetWindowLongA
DrawTextA
LoadIconA
SetForegroundWindow
ShowWindow
FindWindowExA
DrawIcon
IsIconic
GetSystemMetrics
IsWindowVisible
GetDlgCtrlID
GetWindow
MoveWindow
gdi32
GetWindowExtEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetViewportExtEx
CreateRectRgnIndirect
GetRgnBox
SetTextAlign
MoveToEx
LineTo
SetMapMode
SetROP2
SetBkMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
Escape
ExtTextOutA
TextOutA
RectVisible
CreateFontW
GetTextMetricsA
GetTextExtentPointA
CreateSolidBrush
CreateCompatibleBitmap
GetObjectA
CreateCompatibleDC
BitBlt
PtVisible
LPtoDP
DPtoLP
GetMapMode
Rectangle
DeleteObject
GetDeviceCaps
GetStockObject
SetViewportOrgEx
GetTextExtentPoint32A
GetViewportOrgEx
SelectObject
GetBkColor
GetTextColor
CreatePen
CreateFontIndirectA
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegEnumValueA
RegCloseKey
RegOpenKeyExA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegOpenKeyA
RegDeleteKeyA
RegQueryValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegEnumKeyA
shell32
ShellExecuteA
ShellExecuteExA
SHGetSpecialFolderPathA
Shell_NotifyIconA
comctl32
_TrackMouseEvent
ord17
ImageList_Destroy
oledlg
ord8
ole32
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
oleaut32
SysFreeString
SysStringLen
SysAllocStringByteLen
VariantCopy
SysAllocStringLen
SafeArrayDestroy
SysAllocString
OleCreateFontIndirect
VariantChangeType
VariantInit
VariantClear
SystemTimeToVariantTime
wininet
InternetOpenUrlA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
InternetOpenA
Sections
.text Size: 292KB - Virtual size: 290KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ