Static task
static1
Behavioral task
behavioral1
Sample
634bc84c38e713368f51daa034109991_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
634bc84c38e713368f51daa034109991_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
634bc84c38e713368f51daa034109991_JaffaCakes118
-
Size
448KB
-
MD5
634bc84c38e713368f51daa034109991
-
SHA1
91f9b24780e1a9f2b4eb54206bfc3fd770695da9
-
SHA256
638dc54bb4da8a51bd86f908f5de13365e4e5b2fa9af835551fe6690422ecbb9
-
SHA512
17d46ca1e7f000b9d568986881e823bd7492906110a5d4d42f41f3b78ce76aadf559419cb88d90d0a1f40bc95f153f9e574f868b0e8262cd5ddeedba9e414151
-
SSDEEP
12288:JvNy4YNe6IXIpYyEofc7Qqj8X/VeDuUl:O4BEpYhREII
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 634bc84c38e713368f51daa034109991_JaffaCakes118
Files
-
634bc84c38e713368f51daa034109991_JaffaCakes118.exe windows:4 windows x86 arch:x86
ee266ca6818d992ecfe3277a383499d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
kernel32
OpenMutexA
CreateMutexA
GetUserDefaultLangID
FormatMessageA
LocalFree
GetStartupInfoA
CreateProcessA
GetExitCodeProcess
WaitForSingleObject
TerminateProcess
FlushFileBuffers
GlobalAlloc
GlobalFree
HeapFree
GetProcessHeap
HeapAlloc
GetPrivateProfileStringA
GetFileTime
CompareFileTime
WritePrivateProfileStringA
lstrcmpA
Sleep
GetDriveTypeA
SetLastError
GetSystemDefaultLangID
GetVersionExA
GetSystemDirectoryA
GetShortPathNameA
GetLocaleInfoA
InitializeCriticalSection
GetFileSize
GetCommandLineA
GetTempPathA
DeleteCriticalSection
QueryPerformanceCounter
QueryPerformanceFrequency
WriteFile
OutputDebugStringA
CreateFileA
CloseHandle
GetEnvironmentVariableA
lstrlenA
CompareStringW
CompareStringA
GetVersion
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
GetWindowsDirectoryA
FindFirstFileA
FindNextFileA
FindClose
GlobalAddAtomA
GlobalDeleteAtom
GetModuleHandleA
GetModuleFileNameA
GetProcAddress
GetCurrentProcess
FreeLibrary
LoadLibraryA
GetCurrentThreadId
GetTickCount
GetCurrentDirectoryA
GetLastError
EnterCriticalSection
LeaveCriticalSection
GetFullPathNameA
GlobalLock
SizeofResource
LockResource
LoadResource
FindResourceA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThread
LocalAlloc
GetCurrentProcessId
GlobalUnlock
GlobalFlags
InterlockedDecrement
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
ReadFile
SetFilePointer
SetEndOfFile
GetThreadLocale
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
GetCPInfo
GetOEMCP
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
ExitProcess
HeapReAlloc
VirtualAlloc
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
HeapSize
SetStdHandle
GetFileType
GetACP
LCMapStringA
LCMapStringW
GetStdHandle
VirtualFree
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetFileAttributesA
user32
GetDlgItem
SetWindowLongA
ShowWindow
SetWindowPos
GetWindowPlacement
IsIconic
SystemParametersInfoA
CallWindowProcA
DefWindowProcA
CopyRect
RegisterClassA
GetClassInfoA
GetClassInfoExA
CreateWindowExA
GetMenu
GetClientRect
SetForegroundWindow
MapWindowPoints
GetMessagePos
GetMessageTime
DestroyWindow
GetTopWindow
GetForegroundWindow
RemovePropA
GetPropA
GetClassLongA
DrawTextExA
WinHelpA
LoadIconA
GetSysColorBrush
LoadCursorA
DestroyMenu
UnregisterClassA
CheckMenuItem
DrawTextA
TabbedTextOutA
UnhookWindowsHookEx
AdjustWindowRectEx
GetSysColor
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
GetWindowTextA
GetMenuItemID
GetMenuItemCount
GetSubMenu
ReleaseDC
GetDC
SetPropA
GrayStringA
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
IsWindow
MessageBoxA
WaitForInputIdle
MsgWaitForMultipleObjects
PostQuitMessage
GetWindowThreadProcessId
SetWindowTextA
GetSystemMetrics
PeekMessageA
TranslateMessage
DispatchMessageA
PostMessageA
SendMessageA
RegisterWindowMessageA
ModifyMenuA
GetMenuState
GetCapture
EnableMenuItem
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegOpenKeyA
RegCreateKeyExA
RegDeleteKeyA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegQueryValueA
RegEnumKeyA
shlwapi
PathFindExtensionA
oleacc
CreateStdAccessibleObject
LresultFromObject
gdi32
RestoreDC
SetBkColor
SetTextColor
SetMapMode
GetClipBox
SaveDC
DeleteObject
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetStockObject
DeleteDC
CreateBitmap
oleaut32
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 216KB - Virtual size: 213KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 144KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ