Static task
static1
Behavioral task
behavioral1
Sample
73a56e17b39e930702bf680a51fd2806_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
73a56e17b39e930702bf680a51fd2806_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
73a56e17b39e930702bf680a51fd2806_JaffaCakes118
-
Size
468KB
-
MD5
73a56e17b39e930702bf680a51fd2806
-
SHA1
3204ad4f05913cceabefdd731e8f4465e21671d0
-
SHA256
abca3a2b99be01f66da342b6ded45376c8c7c82abc86ffcdc2e9b752a7878308
-
SHA512
529b0f2f0b25921eafd43f960887c27189fbe49f3b0b08714fea7847ea098b775dc20f2dcc7f907f2133020ad9af2397f3ca9d036eb50e68b1fc8adbecc85486
-
SSDEEP
12288:/Tp4saqCh5SOkch29FgPMaJMdyQ29Hk7stko6vytCh0GwyzbIA:F4saqCyOkch29FgPMaJMdyQ2Fk7stkoq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 73a56e17b39e930702bf680a51fd2806_JaffaCakes118
Files
-
73a56e17b39e930702bf680a51fd2806_JaffaCakes118.exe windows:4 windows x86 arch:x86
b45b5e40069c1ab75f5e1efc83f959bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ddraw
DirectDrawEnumerateA
DirectDrawCreate
dplayx
ord5
ord1
ole32
CoInitialize
CoUninitialize
CoCreateInstance
dinput8
DirectInput8Create
kernel32
HeapAlloc
HeapFree
RtlUnwind
ExitProcess
TerminateProcess
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
HeapReAlloc
RaiseException
SetStdHandle
GetFileType
HeapSize
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetHandleCount
GetStdHandle
LCMapStringA
LCMapStringW
GetTimeZoneInformation
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
GetSystemInfo
VirtualQuery
SetEnvironmentVariableA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
GetVersion
CompareStringA
CompareStringW
lstrcmpiA
lstrlenA
LocalFree
FormatMessageA
OutputDebugStringA
FreeLibrary
SetErrorMode
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
GetProcAddress
LoadLibraryA
CloseHandle
ReleaseMutex
GetLastError
GetComputerNameA
CreateEventA
SizeofResource
LockResource
LoadResource
FindResourceA
GetCurrentDirectoryA
OpenMutexA
ReadFile
GetFileTime
GetFileSize
CreateFileA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
CreateMutexA
lstrcmpA
InterlockedDecrement
GetModuleFileNameA
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
lstrcpyA
GetModuleHandleA
SetLastError
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcpynA
GlobalFree
VirtualProtect
GetFileAttributesA
SetFileAttributesA
DeleteFileA
CopyFileA
GetUserDefaultLangID
IsBadCodePtr
user32
DestroyMenu
LoadCursorA
GetSysColorBrush
SetCursor
PostQuitMessage
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMessageA
GetCursorPos
ValidateRect
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SetDlgItemInt
GetDlgItemInt
WinHelpA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
GetKeyState
IsWindowVisible
UpdateWindow
GetMenu
GetSysColor
AdjustWindowRectEx
ScreenToClient
GetClassInfoA
RegisterClassA
UnregisterClassA
SetWindowPlacement
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
CopyRect
PtInRect
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
MapDialogRect
SetWindowPos
GetCapture
GetActiveWindow
SetActiveWindow
GetAsyncKeyState
GetFocus
SetFocus
GetWindowLongA
GetParent
GetDlgItem
IsWindowEnabled
RegisterWindowMessageA
GetWindow
ReleaseDC
GetDC
GetClientRect
GetWindowRect
IsWindow
InvalidateRect
PeekMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
LoadIconA
PostMessageA
SetForegroundWindow
ShowWindow
FindWindowExA
SendMessageA
LoadBitmapA
wsprintfA
EnableWindow
KillTimer
SetTimer
CharUpperA
MapWindowPoints
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
SetMapMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
DeleteObject
GetObjectA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
GetUserNameA
RegQueryValueExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyA
RegEnumKeyA
RegQueryValueA
RegSetValueExA
shell32
ShellExecuteA
comctl32
PropertySheetA
CreatePropertySheetPageA
ord17
DestroyPropertySheetPage
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oleaut32
VariantClear
VariantChangeType
VariantInit
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 220KB - Virtual size: 218KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 172KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE