Static task
static1
Behavioral task
behavioral1
Sample
65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
65e39380be54af7407ba8012931a92f9_JaffaCakes118
-
Size
333KB
-
MD5
65e39380be54af7407ba8012931a92f9
-
SHA1
3b7b8dd04c0915f86756907b853cff71c5879c4a
-
SHA256
3e0a3cd4c6089ed14cd08e64ad8b4fca42408dab2687663005d98b5e47d02509
-
SHA512
56028362b6a78ad15191d9b174ea04de8d40a2c9e500bd835366651b891e30cf6af1b65bc74ae69e55506ab70ed35dcaf16c51082da93360a8d48e40e1f0293d
-
SSDEEP
6144:ouCPuoDYt8NpRqPBO3To0G9S4iXEXiuTkhw:YSOIU345SuTkw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 65e39380be54af7407ba8012931a92f9_JaffaCakes118
Files
-
65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe windows:4 windows x86 arch:x86
09ee18ce55c44c341e17a9140be61ead
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetErrorDlg
HttpAddRequestHeadersW
ws2_32
WSAStartup
WSACleanup
comdlg32
ChooseColorW
CommDlgExtendedError
GetFileTitleW
GetOpenFileNameW
PrintDlgW
GetSaveFileNameW
msvfw32
ICCompressorFree
ICCompressorChoose
gdi32
PolyBezierTo
StartDocW
SetWinMetaFileBits
SetTextColor
SetTextAlign
SetStretchBltMode
SetRectRgn
SetPolyFillMode
SetPixelV
UnrealizeObject
TranslateCharsetInfo
TextOutW
StrokePath
StretchDIBits
StretchBlt
BeginPath
BitBlt
CloseEnhMetaFile
CloseFigure
CloseMetaFile
CombineRgn
CreateBitmap
CreateBitmapIndirect
CreateBrushIndirect
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBPatternBrushPt
CreateDIBSection
CreateDIBitmap
CreateEnhMetaFileW
CreateFontIndirectW
CreateHatchBrush
CreateMetaFileW
CreatePalette
CreatePatternBrush
CreatePen
CreatePolygonRgn
CreateRectRgn
CreateRectRgnIndirect
CreateSolidBrush
DPtoLP
DeleteDC
DeleteEnhMetaFile
DeleteMetaFile
DeleteObject
Ellipse
EndDoc
EndPage
EndPath
EnumEnhMetaFile
EnumFontFamiliesExW
EnumFontFamiliesW
Escape
ExtCreatePen
ExtTextOutW
FillPath
FillRgn
FrameRgn
GdiFlush
GetBitmapBits
GetBkColor
GetBkMode
GetCharWidthW
GetClipBox
GetClipRgn
GetCurrentObject
GetDIBits
GetDeviceCaps
GetEnhMetaFileHeader
GetEnhMetaFileW
GetFontData
GetGlyphOutlineW
GetKerningPairsW
GetMapMode
GetMetaFileBitsEx
GetNearestColor
GetNearestPaletteIndex
GetObjectW
GetOutlineTextMetricsW
GetPaletteEntries
GetPath
GetPixel
GetPolyFillMode
GetStockObject
GetSystemPaletteEntries
GetTextAlign
GetTextCharset
GetTextColor
GetTextExtentExPointW
GetTextExtentPoint32W
GetTextMetricsW
GetViewportExtEx
GetViewportOrgEx
GetWindowExtEx
GetWindowOrgEx
GetWorldTransform
IntersectClipRect
LPtoDP
LineTo
MaskBlt
ModifyWorldTransform
MoveToEx
OffsetRgn
PaintRgn
PatBlt
PlayEnhMetaFileRecord
SetPixel
PolyPolygon
Polygon
Polyline
PolylineTo
PtVisible
RealizePalette
RectVisible
Rectangle
RestoreDC
RoundRect
SaveDC
SelectClipPath
SelectClipRgn
SelectObject
SelectPalette
SetBitmapBits
SetBkColor
SetBkMode
SetBrushOrgEx
SetDIBits
SetDIBitsToDevice
SetMapMode
StartPage
winmm
timeBeginPeriod
mmioAscend
mmioClose
mmioCreateChunk
mmioDescend
mmioOpenA
mmioOpenW
mmioRead
mmioWrite
waveOutWrite
waveOutUnprepareHeader
waveOutReset
waveOutPrepareHeader
waveOutOpen
waveOutGetDevCapsW
waveOutClose
timeSetEvent
timeKillEvent
timeGetTime
timeGetDevCaps
timeEndPeriod
oleaut32
SysAllocString
VariantClear
SysFreeString
shell32
SHChangeNotify
SHBrowseForFolderW
SHCreateDirectoryExW
DragFinish
DragAcceptFiles
CommandLineToArgvW
SHGetDesktopFolder
SHGetFolderPathW
SHGetSpecialFolderPathA
SHGetMalloc
ShellExecuteA
ShellExecuteW
DragQueryFileW
shlwapi
PathFileExistsW
SHDeleteKeyW
ole32
CoTaskMemAlloc
StgIsStorageFile
CoInitialize
CoFreeUnusedLibraries
CoCreateInstance
OleDraw
ReleaseStgMedium
StgCreateDocfile
CoTaskMemFree
StgOpenStorage
CoUninitialize
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
imm32
ImmGetCompositionStringW
ImmGetContext
ImmGetVirtualKey
ImmNotifyIME
ImmReleaseContext
ImmSetCandidateWindow
ImmSetCompositionFontW
ImmSetCompositionWindow
kernel32
GetVersionExW
GlobalFree
GlobalHandle
TerminateProcess
TlsGetValue
VirtualAlloc
VirtualFree
SystemTimeToFileTime
SizeofResource
SetThreadPriority
SetLastError
SetFilePointer
SetFileAttributesW
SetEvent
SetErrorMode
SetEndOfFile
ResumeThread
ResetEvent
RemoveDirectoryW
ReleaseSemaphore
ReleaseMutex
RaiseException
QueryPerformanceFrequency
OutputDebugStringW
OutputDebugStringA
OpenProcess
OpenEventW
MultiByteToWideChar
MulDiv
GetVersionExA
GetVersion
GetTimeFormatW
GetTickCount
GetThreadPriority
GetThreadLocale
GetSystemTimeAsFileTime
GetSystemTime
GetSystemInfo
GetSystemDirectoryA
GetSystemDefaultLangID
GetStdHandle
GetStartupInfoW
GetProfileStringW
GetProcessHeap
GetProcAddress
GetModuleHandleW
GetModuleHandleA
MoveFileW
MapViewOfFile
LockResource
LocalFree
LocalFileTimeToFileTime
LoadResource
LoadLibraryW
LoadLibraryA
LeaveCriticalSection
IsDBCSLeadByte
InterlockedExchange
InterlockedDecrement
InterlockedCompareExchange
InitializeCriticalSection
HeapFree
HeapAlloc
GlobalUnlock
GlobalSize
GlobalReAlloc
WideCharToMultiByte
WriteFile
_llseek
_lread
lstrcmpW
lstrcmpiW
lstrcpyW
lstrlenW
CloseHandle
CompareFileTime
CompareStringW
CopyFileW
CreateDirectoryW
CreateEventA
CreateEventW
CreateFileA
CreateFileMappingW
CreateFileW
CreateMailslotA
CreateMutexA
CreateProcessW
CreateSemaphoreW
CreateThread
DebugBreak
DeleteCriticalSection
DeleteFileA
DeleteFileW
DosDateTimeToFileTime
DuplicateHandle
EnterCriticalSection
ExitProcess
ExitThread
FatalAppExitA
FileTimeToDosDateTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindFirstFileExW
FindFirstFileW
FindNextFileW
FindResourceW
FlushFileBuffers
FormatMessageA
FormatMessageW
FreeLibrary
GetACP
GetCommandLineW
GetComputerNameExA
GetCurrentDirectoryW
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceW
GetExitCodeProcess
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetFileSize
GetFileTime
GetFullPathNameA
GetLastError
GetLocaleInfoA
GetLocaleInfoW
GetLogicalDrives
GetMailslotInfo
GetModuleFileNameA
GetModuleFileNameW
GlobalLock
Sections
.text Size: 227KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 54KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ