Static task
static1
Behavioral task
behavioral1
Sample
7146877963a1d9a62f39906903b0a2de_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7146877963a1d9a62f39906903b0a2de_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7146877963a1d9a62f39906903b0a2de_JaffaCakes118
-
Size
292KB
-
MD5
7146877963a1d9a62f39906903b0a2de
-
SHA1
05ddb647ca9e84f45ef0c6f5f19379c4eb96158b
-
SHA256
f97e37175da90008f1dce2dfff5a080bdf9987bee3d0f60d681f2b139a427f95
-
SHA512
ad5b5e9e7c1df2975bd5056e2b2097028b69f5feea8070ea904718b21623228301a1e74132294e6d7abaaa32f83dd7214c594360e17aa3015d2bd7def474b7e5
-
SSDEEP
6144:+pAxPFnjITSShUdELALNIlujruPFyQDsoFLTBJcEe+rT4:+pAJFnjRLelCuP/DsoFLTrcEex
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7146877963a1d9a62f39906903b0a2de_JaffaCakes118
Files
-
7146877963a1d9a62f39906903b0a2de_JaffaCakes118.exe windows:4 windows x86 arch:x86
dd8a9821580195e8c2982bc29603ba62
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFindExtensionA
PathFindFileNameA
SHSetValueA
advapi32
RegQueryValueA
RegOpenKeyA
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegEnumKeyA
kernel32
LocalFree
TerminateProcess
SetFilePointer
LocalAlloc
RaiseException
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
FlushFileBuffers
SetEndOfFile
GetThreadLocale
FormatMessageA
GlobalGetAtomNameA
GlobalDeleteAtom
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThread
GlobalAddAtomA
lstrcmpW
GlobalFindAtomA
GetModuleFileNameW
InterlockedDecrement
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
SetErrorMode
GlobalFlags
WritePrivateProfileStringA
GetCPInfo
GetOEMCP
HeapFree
UnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapAlloc
VirtualAlloc
HeapReAlloc
ExitProcess
GetFileType
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
HeapSize
HeapDestroy
HeapCreate
VirtualFree
GetACP
GetConsoleCP
GetConsoleMode
GetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
ReadFile
SetLastError
FreeLibrary
Sleep
GetVersionExA
GetModuleHandleA
WriteFile
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetProcAddress
LoadLibraryA
SetUnhandledExceptionFilter
GetVersion
InterlockedExchange
lstrlenA
CloseHandle
CreateFileA
GetModuleFileNameA
MultiByteToWideChar
CompareStringA
lstrcmpA
WaitForSingleObject
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetLastError
GetTimeZoneInformation
GetSystemTime
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
user32
ShowWindow
DestroyMenu
GetSysColorBrush
ReleaseDC
GetDC
LoadCursorA
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
ClientToScreen
UnregisterClassA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
DestroyWindow
IsWindow
GetDlgItem
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostQuitMessage
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
SendMessageA
GetKeyState
PeekMessageA
ValidateRect
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetMenu
SetForegroundWindow
IsWindowVisible
GetWindow
PostMessageA
GetSystemMetrics
GetWindowThreadProcessId
SetWindowTextA
GetClientRect
GetForegroundWindow
EnableWindow
GetWindowTextA
GetCursorPos
LoadIconA
WinHelpA
GetCapture
GetParent
GetClassNameA
RegisterWindowMessageA
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
CallWindowProcA
gdi32
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
RectVisible
TextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
DeleteObject
PtVisible
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
oleaut32
VariantChangeType
VariantInit
VariantClear
Sections
.text Size: 200KB - Virtual size: 197KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ