Static task
static1
Behavioral task
behavioral1
Sample
66c58c0fe09fed2d77edc54c9151fcf7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
66c58c0fe09fed2d77edc54c9151fcf7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
66c58c0fe09fed2d77edc54c9151fcf7_JaffaCakes118
-
Size
696KB
-
MD5
66c58c0fe09fed2d77edc54c9151fcf7
-
SHA1
43843bc4044f2766bf77b283f370e7427abe1d14
-
SHA256
d56c70ea674deb7eadf70d6b4fe43f38599bd30b70723d78d7e352d660304a06
-
SHA512
a89f9919f9d2a1aebc0aa69aeeae282ede0f00aa58c00f4015aa1e1fb7866d8a1708e489d4cf96fc66b873df7b7e25470c759bc6b8df9fcf69ac9937b3d32d48
-
SSDEEP
12288:sb4Vy5LDf/R4Dh7KFUssWCheBehTspK8s7g7i7DV7ungw7HrnUodQ737XV7eVsUf:sbtT/WDh+DPhiTCXF9pRy3G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66c58c0fe09fed2d77edc54c9151fcf7_JaffaCakes118
Files
-
66c58c0fe09fed2d77edc54c9151fcf7_JaffaCakes118.exe windows:4 windows x86 arch:x86
356b3d4cd2cfc4effeddcabf30adf7d7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
GetVolumeInformationA
GetSystemDirectoryA
lstrcpynA
WriteFile
SetFilePointer
CreateFileA
CreateDirectoryA
CreateMutexA
ReadFile
GetFileSize
SetEndOfFile
CloseHandle
DeleteFileA
SizeofResource
LockResource
LoadResource
FindResourceA
GetTempPathA
GetProcessHeap
GetTickCount
ReadProcessMemory
WriteProcessMemory
GetProcAddress
GetModuleHandleA
lstrcatA
OpenProcess
GetCurrentProcessId
UnmapViewOfFile
GlobalUnlock
GlobalLock
GlobalAlloc
MapViewOfFile
DuplicateHandle
GlobalGetAtomNameA
MulDiv
FlushInstructionCache
GetCurrentProcess
SetLastError
GetCurrentThreadId
CreateThread
CreateProcessA
GetUserDefaultLCID
Sleep
CreateEventA
LoadLibraryExA
SetEvent
GlobalFree
GlobalHandle
FindResourceExA
GetLocalTime
LoadLibraryA
GetShortPathNameA
CopyFileA
GetCommandLineA
RaiseException
OpenEventA
GetPriorityClass
ResumeThread
FlushFileBuffers
SetEnvironmentVariableA
SetStdHandle
GetStringTypeW
GetStringTypeA
GetCPInfo
GetOEMCP
IsBadCodePtr
IsBadReadPtr
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
GetTimeZoneInformation
LCMapStringW
LCMapStringA
IsBadWritePtr
VirtualFree
HeapCreate
SetUnhandledExceptionFilter
TerminateProcess
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
QueryPerformanceCounter
GetStartupInfoA
GetSystemTimeAsFileTime
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
RtlUnwind
ExitProcess
HeapSize
HeapReAlloc
HeapDestroy
LeaveCriticalSection
EnterCriticalSection
GetModuleFileNameA
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSection
DeleteCriticalSection
GetLastError
lstrcmpA
CreateRemoteThread
HeapFree
lstrcpyA
HeapAlloc
WaitForSingleObject
ReleaseMutex
lstrlenA
lstrcmpiA
WideCharToMultiByte
lstrlenW
CompareStringA
CompareStringW
MultiByteToWideChar
GetVersion
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
ResetEvent
GetVersionExA
user32
SendMessageA
CallWindowProcA
wsprintfA
LoadImageA
GetDC
ReleaseDC
UnregisterClassA
GetParent
DefWindowProcA
SetFocus
CharUpperA
CharLowerA
PostThreadMessageA
SetWindowTextA
TrackPopupMenu
InsertMenuItemA
UpdateWindow
SetActiveWindow
MessageBoxA
CreateDialogIndirectParamA
SetForegroundWindow
MapWindowPoints
GetSystemMetrics
EndDialog
SystemParametersInfoA
GetMessageA
TranslateMessage
DispatchMessageA
GetDlgItem
InvalidateRgn
SetCapture
ReleaseCapture
CreateAcceleratorTableA
GetDesktopWindow
CharNextA
GetClassNameA
RedrawWindow
EndPaint
DrawTextA
SetWindowPos
GetClientRect
BeginPaint
MoveWindow
ShowWindow
InvalidateRect
GetWindowRect
KillTimer
SetTimer
SetWindowLongA
GetWindowLongA
GetWindowTextA
IsWindow
FillRect
IsChild
GetFocus
GetSysColor
DestroyAcceleratorTable
GetWindowTextLengthA
GetClassInfoExA
SendDlgItemMessageA
MapDialogRect
SetWindowContextHelpId
GetWindow
RegisterWindowMessageA
SendMessageTimeoutA
DestroyWindow
LoadCursorA
RegisterClassExA
CreateWindowExA
FindWindowExA
GetWindowThreadProcessId
CreatePopupMenu
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegDeleteValueA
GetUserNameA
RegOpenKeyA
RegQueryValueA
ole32
CoCreateInstance
CLSIDFromProgID
CoUnmarshalInterface
OleUninitialize
OleInitialize
CoGetClassObject
CoInitialize
CoInitializeEx
CoUninitialize
OleLockRunning
CoTaskMemAlloc
StringFromGUID2
CLSIDFromString
CreateStreamOnHGlobal
oleaut32
VariantClear
SysAllocStringLen
VariantInit
SysAllocString
SysStringLen
SafeArrayCreate
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayDestroy
OleCreateFontIndirect
SysStringByteLen
SysFreeString
LoadRegTypeLi
LoadTypeLi
DispCallFunc
urlmon
UrlMkSetSessionOption
URLDownloadToFileA
shell32
SHGetSpecialFolderPathA
shlwapi
StrToIntExA
StrToIntExW
gdi32
SetPixel
GetPixel
DeleteDC
CreateBitmap
GetObjectA
GetDIBits
CreateCompatibleDC
CreateFontIndirectA
SetTextColor
SetBkMode
SetBkColor
GetStockObject
StretchBlt
SetStretchBltMode
CreateSolidBrush
BitBlt
CreateCompatibleBitmap
GetDeviceCaps
GetTextExtentExPointA
SelectObject
DeleteObject
SetDIBits
comctl32
_TrackMouseEvent
wsock32
gethostname
WSACleanup
ioctlsocket
htonl
gethostbyname
WSAStartup
wininet
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
InternetCloseHandle
Sections
.text Size: 248KB - Virtual size: 248KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 304KB - Virtual size: 304KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE