Static task
static1
Behavioral task
behavioral1
Sample
68666f66a7730f50dae7f535b05369f0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
68666f66a7730f50dae7f535b05369f0_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
68666f66a7730f50dae7f535b05369f0_JaffaCakes118
-
Size
596KB
-
MD5
68666f66a7730f50dae7f535b05369f0
-
SHA1
95fa86f6a657847a1712e9284a43d721a47e1181
-
SHA256
b0fb820171c05108f31dc503c6b9a44f2e283231946c992cf45b8d9301e37487
-
SHA512
eb8065b74f10487f0616b4aed93ab1942888a1d85dd52fd16e25ee88d3679a86da5e0c3a352ae16e90dd913306ee959fb1813f9edc436320be54d7a66442b425
-
SSDEEP
12288:dmZAZ55J1DgHv/9DW+1ATe9sXR4tbMgjscQ0kc0lduTrczm:0qZV2XpiTytbBXQ0kGTrUm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 68666f66a7730f50dae7f535b05369f0_JaffaCakes118
Files
-
68666f66a7730f50dae7f535b05369f0_JaffaCakes118.exe windows:4 windows x86 arch:x86
781925ba429a2ffd74d66060f5301f7a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
wininet
InternetGetLastResponseInfoA
shlwapi
SHGetValueA
PathFileExistsA
PathStripToRootA
PathFindExtensionA
PathFindFileNameA
PathIsUNCA
PathRemoveExtensionA
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyA
SetSecurityDescriptorDacl
RegOpenKeyA
RegDeleteKeyA
kernel32
DeleteFileA
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
GetThreadLocale
DuplicateHandle
FindClose
FindFirstFileA
GetFullPathNameA
FindNextFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
TlsGetValue
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
WritePrivateProfileStringA
GetCurrentDirectoryA
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
GetFileAttributesA
GetFileTime
InterlockedIncrement
RtlUnwind
HeapFree
HeapAlloc
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
GetProcessHeap
GetStartupInfoA
WriteConsoleW
GetFileType
GetStdHandle
ExitThread
CreateThread
HeapSize
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
GetConsoleCP
GetConsoleMode
Sleep
GetACP
GetTimeZoneInformation
LCMapStringA
LCMapStringW
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
DebugBreak
SetStdHandle
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
GetStringTypeA
GetStringTypeW
SetEnvironmentVariableA
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
InterlockedDecrement
GetModuleFileNameW
ReleaseSemaphore
CreateSemaphoreA
FreeResource
GetCurrentProcessId
GlobalAddAtomA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalDeleteAtom
GetModuleHandleA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
MulDiv
CreateEventA
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
RaiseException
LocalAlloc
SetFilePointer
WriteFile
ReadFile
CreateFileA
LocalFree
GetCurrentProcess
SetPriorityClass
DeviceIoControl
CreateMutexA
GetCurrentThreadId
ExitProcess
CopyFileA
GetTempFileNameA
DeleteCriticalSection
SetLastError
GetVolumeInformationA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetProcAddress
FreeLibrary
lstrlenA
lstrcmpiA
CompareStringW
CompareStringA
GetVersion
MultiByteToWideChar
InterlockedExchange
GetTempPathA
GetModuleFileNameA
DosDateTimeToFileTime
LocalFileTimeToFileTime
CompareFileTime
SystemTimeToFileTime
SetFileTime
CloseHandle
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
GetSystemTimeAsFileTime
CreateDirectoryA
user32
BeginPaint
EndPaint
UnregisterClassA
DestroyMenu
ShowWindow
IsDialogMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
UnhookWindowsHookEx
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetNextDlgTabItem
EndDialog
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ClientToScreen
LoadCursorA
GetSubMenu
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
SendMessageA
GetKeyState
PeekMessageA
ValidateRect
wsprintfA
GetParent
GetClassNameA
GetSystemMetrics
GetWindowThreadProcessId
BringWindowToTop
GetClientRect
SetWindowTextA
WaitForInputIdle
EnumThreadWindows
EnumChildWindows
SendMessageTimeoutA
PostMessageA
EnableWindow
RegisterWindowMessageA
SetParent
SetTimer
EnumWindows
GetWindowTextA
GetCursorPos
CharUpperA
GetDC
ReleaseDC
GetSysColorBrush
GetDlgItem
gdi32
GetClipBox
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
ExtTextOutA
CreateBitmap
GetDeviceCaps
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
DeleteObject
GetObjectA
SetBkColor
SetTextColor
Escape
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
ole32
CoInitialize
CoUninitialize
CoGetMalloc
CoInitializeEx
CoCreateInstance
CoDisconnectObject
OleRun
oleaut32
LoadTypeLi
VariantClear
SysFreeString
SysAllocStringLen
SysAllocString
VariantCopy
VariantInit
GetErrorInfo
VariantChangeType
SysStringLen
SysAllocStringByteLen
Sections
.text Size: 464KB - Virtual size: 460KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ