Static task
static1
Behavioral task
behavioral1
Sample
73adce4a6fd0edd8c9b6a27fe4a8aede_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
73adce4a6fd0edd8c9b6a27fe4a8aede_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
73adce4a6fd0edd8c9b6a27fe4a8aede_JaffaCakes118
-
Size
264KB
-
MD5
73adce4a6fd0edd8c9b6a27fe4a8aede
-
SHA1
08dd4a264c13958c68ff29c250cd0b8cc25f970a
-
SHA256
63aea6a0f5aa76f6f384e88de92d99fc79dfcca14638b4711a946eeea984f79b
-
SHA512
de9b1a7c2edc8ff1449167ae3f56b82fafa75476e373f9f1306180bedbbbde92070b95c7ef30a4c175c50c064b713ecc485aca25bd428aac2d784dcaf4db1050
-
SSDEEP
6144:fm7x+cggjKOQAbg9JGlSbVPEeleeWyiGU5bWm2:fC/LWJCUdEe8eW2Y6v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 73adce4a6fd0edd8c9b6a27fe4a8aede_JaffaCakes118
Files
-
73adce4a6fd0edd8c9b6a27fe4a8aede_JaffaCakes118.exe windows:4 windows x86 arch:x86
84f32547c77e135ac6f81c191e65068c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathA
SHGetFolderPathA
SHFileOperationA
wininet
InternetCloseHandle
shlwapi
PathFindExtensionA
PathRemoveExtensionA
PathAppendA
PathFileExistsA
SHGetValueA
PathGetArgsA
PathFindFileNameA
PathIsDirectoryA
iphlpapi
GetAdaptersInfo
kernel32
SetEndOfFile
GetThreadLocale
FindClose
FindFirstFileA
GetFullPathNameA
FindNextFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
LocalAlloc
CreateSemaphoreA
ReleaseSemaphore
GetModuleHandleA
InterlockedDecrement
GetCurrentProcessId
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
GlobalGetAtomNameA
GetCurrentThreadId
GlobalFlags
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GetLocaleInfoA
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
HeapFree
HeapAlloc
VirtualAlloc
HeapReAlloc
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetFileInformationByHandle
PeekNamedPipe
GetFileType
GetProcessHeap
GetStartupInfoA
RaiseException
RtlUnwind
SetStdHandle
HeapSize
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetConsoleCP
GetConsoleMode
GetACP
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
CreateMutexA
RemoveDirectoryA
Sleep
OpenProcess
lstrcmpA
lstrcpyA
SetLastError
GetVolumeInformationA
GetCommandLineA
DeleteFileA
GetVersionExA
GetModuleFileNameA
DeviceIoControl
GetShortPathNameA
GetCurrentProcess
SetPriorityClass
CreateFileA
CloseHandle
TerminateProcess
WaitForSingleObject
GetSystemTime
LocalFree
OutputDebugStringA
GetTimeZoneInformation
FormatMessageA
GetTempPathA
LockResource
LoadLibraryA
GetProcAddress
SizeofResource
GetSystemTimeAsFileTime
SystemTimeToFileTime
LoadResource
FreeLibrary
MoveFileExA
FindResourceA
GetComputerNameA
GetVersion
CompareStringA
lstrcmpiA
GetLastError
InterlockedExchange
MultiByteToWideChar
CompareStringW
WideCharToMultiByte
lstrlenA
user32
CheckMenuItem
EnableMenuItem
ModifyMenuA
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
DestroyMenu
PostQuitMessage
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetWindowPos
SetWindowLongA
IsWindow
GetDlgItem
GetFocus
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
UnregisterClassA
MessageBoxA
GetWindowThreadProcessId
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
SendMessageA
GetParent
GetWindowLongA
PostMessageA
EnumWindows
FindWindowExA
SendMessageTimeoutA
RegisterWindowMessageA
GetWindow
FindWindowA
GetDesktopWindow
GetWindowTextA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetSystemMetrics
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
gdi32
DeleteObject
CreateBitmap
GetStockObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegEnumKeyA
RegCreateKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
ole32
CoGetMalloc
StringFromIID
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 192KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ