Static task
static1
Behavioral task
behavioral1
Sample
6a9728779fa2aad3427b5b543c2a5384_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6a9728779fa2aad3427b5b543c2a5384_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
6a9728779fa2aad3427b5b543c2a5384_JaffaCakes118
-
Size
216KB
-
MD5
6a9728779fa2aad3427b5b543c2a5384
-
SHA1
c3026c064dc91b84ec2be45aa4e3d04b658b8a05
-
SHA256
ea5a678fda0f8bb6174ca80c5597f8ce7ec445c5b55c901f5f6be145dba166ba
-
SHA512
5f22669fc0c0506f7b7f4f95971f522e3b042e090e124c7df81732505b4ddf75c568f4bcfc0722cdaf9742a5c8b0f1e4fc491720075abdad70d3f5497fe8a080
-
SSDEEP
3072:bVeQ66nTQZRkkoi+KXCwgraokswOKUdXLayFPPURXtldYhhKFMh4R:bVeJ6nUZpbSwg5kspZeQMV77
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6a9728779fa2aad3427b5b543c2a5384_JaffaCakes118
Files
-
6a9728779fa2aad3427b5b543c2a5384_JaffaCakes118.exe windows:4 windows x86 arch:x86
f94e6750a367360a7a14d27cdab6e5d8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
SendARP
ws2_32
WSAStartup
inet_ntoa
gethostname
gethostbyname
inet_addr
kernel32
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GetLocaleInfoA
GetCPInfo
GetOEMCP
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
HeapReAlloc
VirtualAlloc
RtlUnwind
ExitProcess
GetCommandLineA
GetProcessHeap
RaiseException
SetStdHandle
GetFileType
GetVersionExA
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GlobalFlags
GetFileTime
GetFileAttributesA
WaitForSingleObject
lstrcmpA
GlobalGetAtomNameA
InterlockedIncrement
InterlockedDecrement
GetModuleHandleA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GetCurrentProcessId
GetProcAddress
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
CloseHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
MoveFileA
LocalAlloc
FreeLibrary
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LoadLibraryA
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
SetLastError
Sleep
GetSystemDirectoryA
GetModuleFileNameA
CopyFileA
CreateToolhelp32Snapshot
Process32First
OpenProcess
TerminateProcess
Process32Next
lstrlenA
CompareStringW
CompareStringA
GetCurrentThreadId
GetVersion
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
HeapSize
user32
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
DestroyMenu
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowPos
SetWindowLongA
IsWindow
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
UnregisterClassA
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
GetWindowTextA
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
GetWindowThreadProcessId
PostQuitMessage
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
CharUpperA
PostThreadMessageA
GetDlgItem
CreateWindowExA
gdi32
DeleteDC
CreateBitmap
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
SetBkColor
RestoreDC
SaveDC
DeleteObject
GetDeviceCaps
GetClipBox
SetMapMode
SetTextColor
PtVisible
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
StartServiceCtrlDispatcherA
QueryServiceStatus
ControlService
StartServiceA
RegisterServiceCtrlHandlerA
CreateServiceA
OpenSCManagerA
OpenServiceA
ChangeServiceConfigA
SetServiceStatus
shell32
ShellExecuteA
shlwapi
UrlUnescapeA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
oleaut32
VariantChangeType
VariantClear
VariantInit
urlmon
URLDownloadToFileA
wininet
InternetCloseHandle
InternetGetLastResponseInfoA
InternetOpenA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetReadFile
InternetOpenUrlA
InternetQueryDataAvailable
FindNextUrlCacheEntryA
FindCloseUrlCache
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
Sections
.text Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ