Static task
static1
Behavioral task
behavioral1
Sample
759c9f4470ff7f2618b083bce740628f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
759c9f4470ff7f2618b083bce740628f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
759c9f4470ff7f2618b083bce740628f_JaffaCakes118
-
Size
275KB
-
MD5
759c9f4470ff7f2618b083bce740628f
-
SHA1
8a5f9134f89eb2c68c1b4c38888c46eaad35f491
-
SHA256
4f634a127d91d13c9ae989e2f885c7d565a0e46ae887b5593c7b15bde7090fd9
-
SHA512
9f4f17db668f3a56b6fd6a030da8d39719dd9a1a2dc49c4eca13d7fd592ae576b90105cf4f39e82f9f826871784241fbbbc0b0540293c705f8d5a07319ab7be4
-
SSDEEP
3072:/A/oRGKvMdm5m6QUXMqEBlOUyERcwiu+uiv7Jx61qFSTf1WRvvS4S+1VJnhOvLyV:4QRGKvMu5cqE6UyEEuxUiZg6jwVJcn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 759c9f4470ff7f2618b083bce740628f_JaffaCakes118
Files
-
759c9f4470ff7f2618b083bce740628f_JaffaCakes118.exe windows:4 windows x86 arch:x86
f4344afdb5078172878663e964716b68
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
shlwapi
StrRChrW
oleaut32
VariantClear
shell32
SHGetDesktopFolder
SHCreateDirectoryExW
SHGetPathFromIDListA
ExtractIconA
ShellExecuteA
gdi32
SetRectRgn
Pie
ExtTextOutW
CreateICA
CreateEllipticRgn
GetRegionData
CombineRgn
GetBkMode
GetTextFaceW
MoveToEx
GetDCOrgEx
StartDocA
GetEnhMetaFileHeader
PtVisible
GetBkColor
GetMetaFileBitsEx
GetTextMetricsW
GetObjectType
InvertRgn
RectInRegion
PlayEnhMetaFileRecord
DeleteMetaFile
GetLayout
GetDIBColorTable
CreateMetaFileW
StartPage
GetWinMetaFileBits
EnumMetaFile
advapi32
GetTokenInformation
RegisterServiceCtrlHandlerW
RegQueryInfoKeyW
ConvertStringSidToSidW
RegCloseKey
OpenServiceA
RegQueryValueW
ole32
OleGetIconOfClass
CoGetInterfaceAndReleaseStream
PropVariantClear
OleFlushClipboard
StringFromCLSID
OleTranslateAccelerator
kernel32
InitializeCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
HeapAlloc
VirtualAlloc
GetFileAttributesExW
FindNextFileA
SetStdHandle
LoadLibraryExA
SearchPathW
_lclose
HeapReAlloc
SetCurrentDirectoryW
LeaveCriticalSection
GetTimeFormatA
GetDateFormatW
MoveFileW
GlobalFree
CompareStringW
Sleep
lstrcpynA
SetLastError
GetUserDefaultLangID
SetFilePointerEx
GetPrivateProfileSectionA
GetConsoleCP
GlobalFindAtomW
GetQueuedCompletionStatus
HeapFree
GetSystemTimeAsFileTime
SetFileAttributesW
VirtualQuery
OpenProcess
SetHandleCount
FlushFileBuffers
SetPriorityClass
GetWindowsDirectoryW
GetExitCodeThread
OpenEventW
WriteProfileStringA
FreeEnvironmentStringsA
QueryPerformanceFrequency
GetProfileStringW
lstrcatA
GlobalLock
GetLongPathNameW
MapViewOfFile
GetOEMCP
LoadLibraryExW
RaiseException
SetErrorMode
IsBadWritePtr
ReadFile
GetProcessTimes
GlobalFlags
LCMapStringA
SetCurrentDirectoryA
GetCurrentThread
GetCurrentProcessId
GetDriveTypeW
lstrcpynW
ReleaseMutex
CreateDirectoryA
FindFirstFileW
InterlockedIncrement
InterlockedDecrement
GetStringTypeW
GetStringTypeA
GetProcAddress
LoadLibraryA
MultiByteToWideChar
GetDiskFreeSpaceA
WriteFile
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetLastError
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetFileType
GetStdHandle
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
LCMapStringW
comdlg32
GetOpenFileNameA
GetSaveFileNameA
GetSaveFileNameW
comctl32
ImageList_LoadImageW
ImageList_DrawEx
CreateToolbarEx
ImageList_SetDragCursorImage
ImageList_Draw
user32
SetForegroundWindow
DrawFrameControl
CharUpperA
EqualRect
CreateCaret
SubtractRect
FlashWindowEx
GetClassNameA
GetInputState
GetCapture
CheckMenuItem
CharPrevA
CreateDialogParamW
ReleaseCapture
IsCharAlphaNumericW
RegisterWindowMessageA
DrawFocusRect
CopyRect
InsertMenuItemA
GetWindowLongW
CreateDialogIndirectParamW
GetQueueStatus
GetIconInfo
DrawTextExW
OemToCharA
IsWindow
CopyAcceleratorTableW
WinHelpW
SetWindowPlacement
GetSysColorBrush
IntersectRect
DdeUninitialize
GetScrollRange
GetClassInfoA
CharLowerBuffA
ClientToScreen
DdeClientTransaction
LoadMenuA
InvertRect
CopyImage
CreateIcon
GetMenuStringW
GetSysColor
WindowFromPoint
SetWindowsHookExA
DestroyCaret
EnumThreadWindows
GetWindowModuleFileNameA
SetDlgItemTextW
ShowCaret
GetKeyboardLayout
GetSystemMetrics
TranslateAcceleratorA
BeginPaint
PeekMessageW
DrawTextA
DdeQueryNextServer
TranslateAcceleratorW
SetMenuItemInfoW
NotifyWinEvent
LoadIconW
SetMenuItemBitmaps
MessageBoxIndirectW
CreateWindowExW
DdeDisconnect
DdeConnectList
GetWindowPlacement
GetSubMenu
GetWindowLongA
SetScrollPos
CharLowerW
GetKeyboardState
DefFrameProcA
TranslateMessage
GetTopWindow
GetDC
GrayStringW
LoadIconA
ModifyMenuA
AttachThreadInput
CharUpperBuffA
GetClipboardData
GetNextDlgGroupItem
Sections
.text Size: 228KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ