Static task
static1
Behavioral task
behavioral1
Sample
6433065e0c3c93bdbf2e03639759fdc8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6433065e0c3c93bdbf2e03639759fdc8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6433065e0c3c93bdbf2e03639759fdc8_JaffaCakes118
-
Size
508KB
-
MD5
6433065e0c3c93bdbf2e03639759fdc8
-
SHA1
947655c4aa6ff6e141780cdf004d12a72d74b05f
-
SHA256
6ff22ce229693bbf8e0a296c49b4d215e33e1a4c7d2442770ba047b8c20f17e7
-
SHA512
a1942038ae6776e16d8a451badc1ca602973cb719941c08f4e9e634799fdf72dd69c1057689da1cb3af4eee3724983addd9a2c40cb708f933b80db851bf9929f
-
SSDEEP
12288:mCZl9GkK6d3pODTMMnMMMMMMzHp6MG9hCbiy2RlI0Sj:mCZl97doDTMMnMMMMMMzJ6MG9hCGyyO9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6433065e0c3c93bdbf2e03639759fdc8_JaffaCakes118
Files
-
6433065e0c3c93bdbf2e03639759fdc8_JaffaCakes118.exe windows:4 windows x86 arch:x86
0aa8f8342c2c37043778328f2d775a43
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
samlib
SamConnect
SamLookupNamesInDomain
SamConnectWithCreds
ws2_32
setsockopt
WSAConnect
ole32
OleSave
OleLoad
ddraw
DirectDrawEnumerateA
advapi32
SetSecurityDescriptorDacl
RegCreateKeyW
LookupPrivilegeValueA
RegQueryValueA
RegQueryValueExW
RegEnumValueW
InitializeSecurityDescriptor
DeregisterEventSource
RegQueryInfoKeyA
RegSetValueExW
RegQueryValueExA
RegCreateKeyA
RegEnumKeyA
RegCloseKey
RegOpenKeyExA
RegisterEventSourceA
RegOpenKeyA
RegDeleteKeyA
RegDeleteKeyW
RegOpenKeyW
RegDeleteValueA
OpenProcessToken
RegSetValueExA
AdjustTokenPrivileges
RegSetValueA
RegEnumKeyW
RegDeleteValueW
ReportEventA
RegEnumValueA
user32
CreateCaret
EnableMenuItem
SetWindowsHookExA
SetFocus
GetClientRect
GetKeyboardState
DestroyCursor
CharToOemBuffA
GetMenuItemInfoA
EnumThreadWindows
IsClipboardFormatAvailable
CharLowerBuffW
DispatchMessageA
CharUpperA
KillTimer
keybd_event
CheckMenuItem
VkKeyScanA
DdeCreateStringHandleA
DeleteMenu
wsprintfA
AdjustWindowRectEx
SetMenuDefaultItem
GetCaretBlinkTime
CharUpperBuffA
RegisterClassExA
GetScrollInfo
LoadAcceleratorsA
RemovePropA
GetSysColor
GetFocus
TrackPopupMenu
GetTabbedTextExtentA
MoveWindow
DdeGetLastError
AdjustWindowRect
SetWindowPos
EmptyClipboard
GetQueueStatus
EqualRect
SetRect
TabbedTextOutA
UnregisterClassA
GetDC
GetClipboardData
ModifyMenuA
VkKeyScanW
GetClassInfoExA
EndPaint
BeginPaint
SetKeyboardState
SetActiveWindow
BeginDeferWindowPos
GetPropA
SetScrollPos
ReleaseCapture
DestroyWindow
AppendMenuA
DdeInitializeA
GetSubMenu
GetWindowTextLengthA
FindWindowA
SetWindowsHookExW
EnableWindow
WindowFromPoint
SetWindowRgn
CreateIcon
GetWindowLongA
DdeAbandonTransaction
SetCaretPos
DefMDIChildProcA
CreateMenu
DdeSetUserHandle
CallWindowProcA
IsRectEmpty
GetDoubleClickTime
GetClassNameA
RemoveMenu
GetKeyboardLayout
IsWindow
LoadImageA
UnhookWindowsHookEx
ReleaseDC
GetMenuItemCount
DefFrameProcA
DrawTextA
DdeFreeDataHandle
DdeQueryConvInfo
TranslateMessage
DdePostAdvise
MsgWaitForMultipleObjects
CreateCursor
ShowCaret
SetCursorPos
GetParent
GetWindowDC
GetClassInfoA
InvalidateRect
IsDialogMessageA
HideCaret
SetClipboardData
GetDCEx
GetMenuStringA
ShowWindow
LockWindowUpdate
IsCharAlphaA
GetIconInfo
SetWindowContextHelpId
FindWindowW
WinHelpA
DeferWindowPos
AttachThreadInput
GetAsyncKeyState
CreateAcceleratorTableA
LoadBitmapA
DdeCreateDataHandle
GetScrollPos
MessageBoxA
DdeGetData
GetDlgItem
ClientToScreen
GetMenu
DdeNameService
GetKeyState
GetCursor
CharUpperBuffW
ClipCursor
SetMenu
SystemParametersInfoA
GetWindowThreadProcessId
DrawIcon
InvalidateRgn
ShowCursor
GetMessagePos
SetWindowLongA
PtInRect
SetWindowTextA
GetWindowRect
UpdateWindow
GetCapture
PostMessageW
IsChild
OffsetRect
DdeConnect
InsertMenuA
EndDeferWindowPos
GetWindowTextA
ScreenToClient
ToAscii
DrawMenuBar
CharLowerA
LoadIconA
GetMessageTime
DdeCmpStringHandles
CharLowerBuffA
PostQuitMessage
DestroyAcceleratorTable
LoadCursorA
GetCursorPos
OpenClipboard
CloseClipboard
SendDlgItemMessageA
EnumClipboardFormats
PeekMessageW
DestroyCaret
PostMessageA
LoadStringA
EndDialog
OemToCharA
CreatePopupMenu
SetForegroundWindow
SetTimer
CreateDialogParamA
IntersectRect
GetClipboardFormatNameA
WaitMessage
SetCursor
DdeClientTransaction
CharToOemA
SetDlgItemTextA
DrawFocusRect
CopyAcceleratorTableA
CopyRect
DialogBoxParamA
GetWindowRgn
SetCapture
DestroyMenu
CharNextA
GetDesktopWindow
GetUpdateRgn
PeekMessageA
MessageBoxIndirectA
GetActiveWindow
SetPropA
GetMenuState
IsIconic
BringWindowToTop
RegisterClassA
GetWindow
SetParent
GetUpdateRect
SetScrollRange
DdeUninitialize
GetForegroundWindow
GetSystemMenu
MapWindowPoints
IsZoomed
ShowScrollBar
InflateRect
PostThreadMessageA
IsWindowEnabled
SetMenuItemInfoA
GetLastActivePopup
GetCaretPos
SendMessageA
DrawFrameControl
GetMenuItemID
FrameRect
GetSystemMetrics
CallNextHookEx
FillRect
DdeQueryStringA
RegisterClipboardFormatA
DdeFreeStringHandle
MessageBeep
SetScrollInfo
WaitForInputIdle
DefWindowProcA
SubtractRect
CharPrevA
DdeDisconnect
IsWindowVisible
DestroyIcon
CreateWindowExA
TranslateMDISysAccel
kernel32
GetUserDefaultLangID
lstrcpynA
GetCPInfo
GetLocaleInfoA
GetSystemInfo
TlsAlloc
GetModuleFileNameW
FileTimeToSystemTime
GetWindowsDirectoryA
Sleep
lstrcmpiA
ExitProcess
SearchPathA
GetExitCodeProcess
GlobalUnlock
GetCurrentProcess
HeapAlloc
ResetEvent
ResumeThread
TlsSetValue
SetLastError
LoadLibraryExA
GetStdHandle
CreateEventA
FreeEnvironmentStringsW
GetDateFormatA
DuplicateHandle
SetFileTime
CreateThread
RaiseException
WinExec
GetSystemTime
CreateProcessA
SetHandleCount
IsBadReadPtr
FreeLibrary
DeleteFileA
GetEnvironmentStringsW
GetSystemDefaultLCID
lstrcatA
GetFileAttributesA
GetCommandLineA
GlobalHandle
GetVersionExA
GetProfileStringA
HeapCreate
VirtualAlloc
LockFile
GetSystemDefaultLangID
FindFirstFileA
IsDBCSLeadByte
GetStringTypeExA
FlushInstructionCache
HeapDestroy
GlobalAlloc
GetSystemDirectoryA
GetTickCount
WriteFile
InitializeCriticalSection
_lclose
ExitThread
SetEvent
LoadResource
InterlockedIncrement
IsBadCodePtr
UnhandledExceptionFilter
lstrcmpiW
GetModuleHandleA
VirtualQuery
GetCurrentDirectoryA
lstrlenA
InterlockedDecrement
HeapReAlloc
UnlockFile
GetFileTime
GlobalReAlloc
GetModuleFileNameA
SetEnvironmentVariableA
MulDiv
lstrcmpA
GetFullPathNameA
CreateFileA
LockResource
TlsFree
FormatMessageW
GetLocalTime
FileTimeToLocalFileTime
TlsGetValue
GetOEMCP
RemoveDirectoryA
GlobalFree
CloseHandle
HeapSize
MultiByteToWideChar
GlobalDeleteAtom
GetFileType
GetLastError
LeaveCriticalSection
GetDriveTypeA
TerminateProcess
GetTimeZoneInformation
GlobalSize
LoadLibraryA
RtlUnwind
SetCurrentDirectoryA
_lwrite
FormatMessageA
GetACP
GetTempPathA
_llseek
CreateDirectoryA
VirtualFree
GetUserDefaultLCID
ReadFile
DeleteCriticalSection
FindResourceA
FreeEnvironmentStringsA
GetVersion
SetEndOfFile
SetStdHandle
GetTempFileNameA
VirtualProtect
EnterCriticalSection
_lread
SizeofResource
GlobalAddAtomA
CompareStringA
GetShortPathNameA
CreateSemaphoreA
GetCurrentThreadId
lstrcpyA
SetErrorMode
GetProcAddress
LCMapStringW
GetStringTypeA
GlobalLock
CompareStringW
FreeResource
HeapFree
SystemTimeToFileTime
ReleaseSemaphore
SetFilePointer
FindNextFileA
GetStringTypeW
FlushFileBuffers
GetCurrentProcessId
GetVolumeInformationA
GetEnvironmentStrings
FindClose
SetFileAttributesA
SetLocalTime
WaitForSingleObject
LCMapStringA
CreateProcessW
MoveFileA
GetStartupInfoA
WideCharToMultiByte
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 155KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 207KB - Virtual size: 207KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ