Static task
static1
Behavioral task
behavioral1
Sample
78123b10f91db115b77765e7b7cd6c94_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
78123b10f91db115b77765e7b7cd6c94_JaffaCakes118.exe
Resource
win10v2004-20240729-en
General
-
Target
78123b10f91db115b77765e7b7cd6c94_JaffaCakes118
-
Size
416KB
-
MD5
78123b10f91db115b77765e7b7cd6c94
-
SHA1
77b8579b107b6f35df484528aebae90c64f5bba3
-
SHA256
ad618e7e69c8b3afc5f6dae16ea947e03d0880e9effdf8f35480f346b47d4564
-
SHA512
6c8ebd4390b8a662b636ba77461e0478c40cfbeba18654f554d68b09a44fc8c6ad12385a65cefb8030dde9aefc8454ee75d2a6a805be9ba348b9af55d2095f3c
-
SSDEEP
3072:GWgQcOCxYDtvX7DPmDUiUPA9AhK+wufaSvA+p20kFawGgSq3IFKo9sVEWqvcbBEs:GRxo1X77UUPAr+79vN6CJWTAJM5q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 78123b10f91db115b77765e7b7cd6c94_JaffaCakes118
Files
-
78123b10f91db115b77765e7b7cd6c94_JaffaCakes118.exe windows:4 windows x86 arch:x86
fcccd8d12a637c1b6307433b8cead343
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapDestroy
HeapCreate
VirtualFree
GetFileType
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetTimeZoneInformation
HeapSize
GetACP
HeapReAlloc
CreateThread
TerminateProcess
ExitThread
HeapFree
HeapAlloc
RaiseException
RtlUnwind
ExitProcess
GetStartupInfoA
GetTickCount
FileTimeToSystemTime
FileTimeToLocalFileTime
SetErrorMode
IsBadReadPtr
IsBadCodePtr
GetVersion
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
FormatMessageA
LocalFree
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
GetModuleFileNameA
InterlockedDecrement
LoadLibraryA
GetProcAddress
FreeLibrary
GetCurrentProcess
GetCommandLineA
Sleep
CreateEventA
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
InterlockedExchange
lstrcatA
WinExec
GetPrivateProfileIntA
CreateFileA
CloseHandle
WritePrivateProfileStringA
GetLastError
GetVersionExA
lstrcpyA
GetFileTime
GetFileSize
GetThreadLocale
GetProfileStringA
GetFileAttributesA
GetVolumeInformationA
GetFullPathNameA
FindFirstFileA
FindClose
UnlockFile
SetEndOfFile
SetFilePointer
LockFile
FlushFileBuffers
DuplicateHandle
WriteFile
ReadFile
GetOEMCP
SizeofResource
GlobalFlags
GetCPInfo
GetProcessVersion
TlsSetValue
TlsGetValue
LocalReAlloc
LeaveCriticalSection
EnterCriticalSection
GlobalReAlloc
DeleteCriticalSection
TlsFree
GlobalHandle
LocalAlloc
TlsAlloc
InitializeCriticalSection
GetCurrentThread
GlobalAlloc
lstrcmpA
GetPrivateProfileStringA
SuspendThread
SetThreadPriority
GlobalLock
VirtualProtect
GlobalFree
lstrcpynA
GlobalUnlock
SetLastError
LoadResource
MulDiv
FindResourceA
LockResource
lstrlenA
user32
MessageBeep
CopyAcceleratorTableA
CharNextA
CharUpperA
GetSysColorBrush
GetDesktopWindow
GetClassNameA
DestroyMenu
SetWindowContextHelpId
PostQuitMessage
GetMessageA
TranslateMessage
ValidateRect
GetCursorPos
WindowFromPoint
wvsprintfA
EndDialog
MapDialogRect
GetActiveWindow
GetAsyncKeyState
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GetDC
ReleaseDC
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetNextDlgTabItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterClipboardFormatA
PostThreadMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
PeekMessageA
GetFocus
SetActiveWindow
IsWindow
SetFocus
AdjustWindowRectEx
ScreenToClient
IsWindowVisible
GetTopWindow
IsChild
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
DestroyWindow
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
UnhookWindowsHookEx
SetCursor
ExitWindowsEx
IsIconic
GetSystemMetrics
DrawIcon
GetSystemMenu
AppendMenuA
GetWindowRect
LoadIconA
LoadImageA
LoadCursorA
PostMessageA
GetNextDlgGroupItem
EnableWindow
GetSysColor
InvalidateRect
GetCapture
SetCapture
ReleaseCapture
GetClientRect
PtInRect
GetParent
SendMessageA
FrameRect
InflateRect
CopyRect
SetRect
DrawStateA
DrawFocusRect
MessageBoxA
LoadStringA
DispatchMessageA
CreateDialogIndirectParamA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DefDlgProcA
IsWindowUnicode
gdi32
CreateRectRgn
RoundRect
GetTextExtentPoint32A
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
MoveToEx
LineTo
GetViewportExtEx
GetWindowExtEx
SetPixel
CreateSolidBrush
CreatePen
PtVisible
TextOutA
Escape
RectVisible
GetTextColor
GetBkColor
LPtoDP
CreateDIBitmap
CreateCompatibleDC
DeleteObject
GetTextExtentPointA
ScaleViewportExtEx
SetViewportExtEx
SetMapMode
SetViewportOrgEx
SetBkMode
GetStockObject
SelectObject
PtInRegion
SaveDC
RestoreDC
DeleteDC
DPtoLP
ExtTextOutA
PatBlt
GetMapMode
GetDeviceCaps
GetObjectA
BitBlt
CreateBitmap
OffsetViewportOrgEx
SetBkColor
SetTextColor
GetClipBox
comdlg32
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegQueryValueExA
RegCloseKey
RegSetKeySecurity
InitializeSecurityDescriptor
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegQueryValueA
RegEnumKeyExA
RegEnumValueA
InitiateSystemShutdownA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
shell32
ShellExecuteA
comctl32
CreatePropertySheetPageA
ImageList_AddMasked
ImageList_Draw
ord17
PropertySheetA
DestroyPropertySheetPage
ImageList_Destroy
ImageList_Create
ImageList_LoadImageA
oledlg
ord8
ole32
CoRegisterMessageFilter
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
olepro32
ord253
oleaut32
SysStringLen
SysAllocStringByteLen
SysAllocString
VariantTimeToSystemTime
VariantClear
SysAllocStringLen
SysFreeString
VariantCopy
VariantChangeType
wsock32
inet_addr
gethostbyname
htonl
WSACleanup
ioctlsocket
WSAStartup
Sections
.text Size: 192KB - Virtual size: 189KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 208KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 152KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ