Static task
static1
Behavioral task
behavioral1
Sample
6fb041ac520b3d6b6b517046834e6795_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6fb041ac520b3d6b6b517046834e6795_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6fb041ac520b3d6b6b517046834e6795_JaffaCakes118
-
Size
255KB
-
MD5
6fb041ac520b3d6b6b517046834e6795
-
SHA1
7522f70a4fdc153a3c2deb87c9a703b4e1bd13b6
-
SHA256
04e4400c4169b503b1445350e00492aa24fdff4cfaf06f2f6f81548ad64953c1
-
SHA512
2c80b1628aeddc459a010ffab4b7b1a277a16c8943de459c721cbf49f41293ba46da9343fcee9c4a020c4b9a5aedc61af1774fa9ff5e6377f334412e21f8a7b9
-
SSDEEP
3072:YZQkhpYP2qAD81qMRQTpoZN2VmSubsZoyKHA2gE:YZQkz1quKQ94scA2gE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6fb041ac520b3d6b6b517046834e6795_JaffaCakes118
Files
-
6fb041ac520b3d6b6b517046834e6795_JaffaCakes118.exe windows:4 windows x86 arch:x86
9c4728e9284e2359fcbea3ca22f09880
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
lstrlenA
_lread
GetWindowsDirectoryA
ExpandEnvironmentStringsA
CreateDirectoryA
GetModuleFileNameA
SetCurrentDirectoryA
OpenMutexA
CreateMutexA
GetLastError
ReleaseMutex
GetVersionExA
WaitForSingleObject
_lopen
_lclose
SetFileAttributesA
DeleteFileA
CopyFileA
_llseek
_lwrite
Sleep
SetEnvironmentVariableA
CompareStringW
CompareStringA
FindClose
FindFirstFileA
GlobalFree
GlobalAlloc
MultiByteToWideChar
WideCharToMultiByte
EnterCriticalSection
lstrcpynA
lstrcpyA
FreeLibrary
LocalAlloc
LocalFree
FormatMessageA
LoadLibraryA
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
DuplicateHandle
GetCurrentProcess
CreateFileA
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
CloseHandle
LockFile
UnlockFile
SetEndOfFile
GetProcAddress
GetVolumeInformationA
GetFullPathNameA
lstrcmpiA
SetLastError
InterlockedIncrement
InterlockedDecrement
GetFileAttributesA
GetFileSize
GetFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
lstrcatA
TlsAlloc
GlobalUnlock
GlobalHandle
GlobalLock
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GetVersion
lstrcmpA
GetCurrentThreadId
GetModuleHandleA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
GlobalFlags
GetCPInfo
GetOEMCP
GetTimeZoneInformation
GetSystemTime
GetLocalTime
RtlUnwind
CreateThread
ExitThread
GetStartupInfoA
ExitProcess
RaiseException
HeapAlloc
HeapFree
SetStdHandle
GetFileType
GetACP
HeapSize
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
user32
CharUpperA
UnhookWindowsHookEx
EnableWindow
IsWindowEnabled
GetLastActivePopup
LoadStringA
SetWindowsHookExA
PeekMessageA
CallNextHookEx
GetKeyState
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetWindowRect
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetWindowPos
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
DestroyWindow
GetDlgCtrlID
GetWindowTextA
GetDlgItem
GetMenuItemID
GetSubMenu
GetMenuItemCount
GetMenu
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
LoadCursorA
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
SetWindowLongA
GetClientRect
GetWindowLongA
SendMessageA
UpdateWindow
ShowWindow
CreateWindowExA
GetSystemMetrics
RegisterClassA
GetSysColorBrush
SetRect
DefWindowProcA
IsWindow
TranslateMessage
DispatchMessageA
GetMessageA
GetParent
GetWindow
MessageBoxA
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
shell32
ShellExecuteA
ole32
OleSetContainedObject
OleInitialize
OleCreate
ws2_32
recv
connect
WSAGetLastError
closesocket
ioctlsocket
htons
gethostbyname
socket
send
WSACleanup
WSAStartup
setsockopt
sendto
winmm
timeGetTime
comctl32
ord17
wininet
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
InternetGetLastResponseInfoA
InternetOpenUrlA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetQueryDataAvailable
gdi32
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
SaveDC
DeleteDC
DeleteObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comdlg32
GetFileTitleA
oleaut32
SysFreeString
VariantInit
SysAllocString
VariantClear
SafeArrayCreate
SafeArrayDestroy
SafeArrayAccessData
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE