Static task
static1
Behavioral task
behavioral1
Sample
7089c29717bcbb5137c18f7b525fbcdc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7089c29717bcbb5137c18f7b525fbcdc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7089c29717bcbb5137c18f7b525fbcdc_JaffaCakes118
-
Size
148KB
-
MD5
7089c29717bcbb5137c18f7b525fbcdc
-
SHA1
ac948fb4a0db64003ea8047a5b4708d1fbe09412
-
SHA256
537559788e807cd083d60beae72f55522b8c832adb8dadadc9a997f2b7e3eac4
-
SHA512
5b4ebaa7d017a712eb5a32c6dd75d06b0931b793aca4a11c64ffc06186ccf9b8d857025c0c9d429452b8be8899256bef2c81ea262698c1e0db93fe306b9a727a
-
SSDEEP
3072:okNc2BAd1nOb1nj3lmjp7MfZLBhjlbx9fq4T4QaZBT6:okC2idYBj3wduZLB7bxlT4x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7089c29717bcbb5137c18f7b525fbcdc_JaffaCakes118
Files
-
7089c29717bcbb5137c18f7b525fbcdc_JaffaCakes118.exe windows:4 windows x86 arch:x86
a785cdfef105c88716d76ba6da721422
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
CreateFileW
DeleteFileW
ExitThread
ExpandEnvironmentStringsA
FileTimeToDosDateTime
FileTimeToSystemTime
FindFirstFileW
FindNextFileW
FindResourceA
FormatMessageA
FreeEnvironmentStringsA
FreeLibrary
GetCPInfo
GetCommandLineW
GetConsoleMode
GetCurrentProcess
GetDriveTypeA
GetFileSize
GetFileTime
GetLocaleInfoW
GetModuleHandleA
GetModuleHandleW
GetSystemDirectoryA
GetSystemTimeAsFileTime
GetTempPathA
GetUserDefaultLangID
GlobalFree
GlobalHandle
GlobalLock
GlobalReAlloc
HeapAlloc
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InterlockedDecrement
InterlockedIncrement
IsBadCodePtr
IsValidCodePage
LoadLibraryExA
LoadLibraryExW
LoadResource
LocalFileTimeToFileTime
LocalFree
LockResource
MoveFileA
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
ReleaseMutex
RemoveDirectoryA
RtlUnwind
SetEndOfFile
SetFileAttributesA
SetFileAttributesW
SetFilePointer
SetFileTime
SetHandleCount
SetLastError
SetUnhandledExceptionFilter
TlsAlloc
TlsGetValue
TlsSetValue
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
lstrcmpA
lstrcmpiW
lstrcpyA
lstrcpynA
lstrlenW
user32
AdjustWindowRectEx
CharNextA
CheckMenuItem
CreatePopupMenu
DeleteMenu
DestroyCursor
DrawEdge
DrawIcon
DrawTextA
EmptyClipboard
EndPaint
EnumWindows
FillRect
FrameRect
GetClassNameA
GetDesktopWindow
GetDlgItem
GetForegroundWindow
GetKeyboardType
GetScrollInfo
GetScrollRange
GetSubMenu
GetWindowDC
GetWindowLongA
GetWindowPlacement
GetWindowThreadProcessId
InsertMenuA
InvalidateRect
IsDialogMessageA
IsIconic
IsRectEmpty
IsZoomed
LoadCursorA
MapWindowPoints
MessageBeep
OpenClipboard
PostMessageA
ScreenToClient
SetCapture
SetCursor
SetFocus
SetMenu
SetScrollInfo
SetScrollPos
SetScrollRange
SetWindowPos
ShowOwnedPopups
SystemParametersInfoA
TranslateMessage
UnhookWindowsHookEx
UpdateWindow
WindowFromPoint
gdi32
CloseMetaFile
CreateBrushIndirect
CreateCompatibleDC
CreateDIBPatternBrushPt
CreateEllipticRgn
CreateFontIndirectW
CreatePatternBrush
CreatePolygonRgn
CreateRectRgnIndirect
CreateSolidBrush
DeleteEnhMetaFile
ExtFloodFill
ExtSelectClipRgn
FrameRgn
GetCharWidthA
GetCharWidthW
GetClipBox
GetDIBColorTable
GetDIBits
GetDeviceCaps
GetMetaFileBitsEx
GetNearestColor
GetObjectA
GetObjectType
GetObjectW
GetPaletteEntries
GetTextExtentPointA
GetTextFaceW
GetTextMetricsA
GetTextMetricsW
GetViewportExtEx
GetViewportOrgEx
GetWindowOrgEx
IntersectClipRect
LPtoDP
LineDDA
OffsetViewportOrgEx
Pie
PlayEnhMetaFile
PlayMetaFile
PolyBezierTo
Polyline
PolylineTo
PtInRegion
Rectangle
RestoreDC
SelectClipPath
SetColorAdjustment
SetDIBits
SetGraphicsMode
SetMapperFlags
SetMetaFileBitsEx
SetROP2
SetStretchBltMode
SetViewportExtEx
SetWindowExtEx
StartDocW
StartPage
StretchBlt
TextOutA
UnrealizeObject
shell32
DragFinish
DragQueryFileW
ExtractIconA
FindExecutableW
SHAddToRecentDocs
SHBrowseForFolder
SHChangeNotify
SHCreateDirectoryExW
SHFileOperationA
SHFileOperationW
SHGetDesktopFolder
SHGetFileInfo
SHGetFolderPathA
SHGetSpecialFolderLocation
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
ShellExecuteA
ShellExecuteEx
ShellExecuteExA
comctl32
CreatePropertySheetPageW
CreateStatusWindowA
CreateToolbarEx
DestroyPropertySheetPage
ImageList_AddMasked
ImageList_Destroy
ImageList_DragShowNolock
ImageList_Draw
ImageList_GetIconSize
ImageList_GetImageCount
ImageList_LoadImageW
ImageList_Read
ImageList_Remove
ImageList_Replace
ImageList_ReplaceIcon
ImageList_SetOverlayImage
InitCommonControlsEx
PropertySheetA
PropertySheetW
advapi32
AddAccessAllowedAce
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
ControlService
ConvertStringSecurityDescriptorToSecurityDescriptorW
CryptAcquireContextA
CryptDestroyHash
CryptGenRandom
CryptHashData
CryptReleaseContext
DeleteService
DeregisterEventSource
InitializeAcl
InitializeSecurityDescriptor
InitiateSystemShutdownA
LookupPrivilegeValueW
OpenSCManagerA
OpenSCManagerW
OpenServiceW
QueryServiceStatus
RegCloseKey
RegCreateKeyA
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyA
RegEnumKeyExA
RegEnumKeyExW
RegEnumKeyW
RegEnumValueW
RegFlushKey
RegOpenKeyA
RegOpenKeyExW
RegOpenKeyW
RegQueryInfoKeyA
RegQueryInfoKeyW
RegSetValueExA
RegSetValueExW
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
msvcrt
_EH_prolog
__badioinfo
__isascii
__pioinfo
__winitenv
_chdir
_close
_endthreadex
_findclose
_findfirst
_finite
_i64tow
_mbsstr
_pctype
_rmdir
_setjmp3
_snwprintf
_strdup
_stricmp
_unlink
fgetws
frexp
putchar
raise
strncat
strncmp
strtoul
tan
wcscat
wcschr
oleaut32
CreateErrorInfo
GetActiveObject
GetErrorInfo
RegisterTypeLib
SafeArrayCreate
SafeArrayPtrOfIndex
SafeArrayRedim
SysAllocStringLen
SysFreeString
SysStringLen
VariantClear
VariantInit
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ