Static task
static1
Behavioral task
behavioral1
Sample
790dc67f9dad891b873fdd01e8032a13_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
790dc67f9dad891b873fdd01e8032a13_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
790dc67f9dad891b873fdd01e8032a13_JaffaCakes118
-
Size
624KB
-
MD5
790dc67f9dad891b873fdd01e8032a13
-
SHA1
d0054ac836bcc89e396a898dad68c75b44ce1bca
-
SHA256
4665bdab7956b93b703f080bffe7ec49c74c2e7cf1f0f03d458a9c8fb8ee630d
-
SHA512
6b0e2d13b56e7dc09552b56e1ded6c17859d85eeb8284ee6489fb048fc863cc68ba722d7e96bfffb5fb81347c1889a011c4c01a25c77e108a378bf416abeac97
-
SSDEEP
6144:0uTjTKJ3pSEcN98TnbmOk8NTgmNwQeP7cRpsUdYKkdjTkhchK2/ZjaMei4E:04C3pSEE9OXk89gb4nldYNdjIhcH/hJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 790dc67f9dad891b873fdd01e8032a13_JaffaCakes118
Files
-
790dc67f9dad891b873fdd01e8032a13_JaffaCakes118.exe windows:4 windows x86 arch:x86
3e505bfcae4020e61edcd79d7535e4cf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadLocale
MultiByteToWideChar
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GetCurrentProcess
DuplicateHandle
SetLastError
lstrcpynA
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
SetStdHandle
CompareStringW
CompareStringA
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
SetEnvironmentVariableA
IsBadWritePtr
VirtualAlloc
LCMapStringW
LCMapStringA
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
WritePrivateProfileStringA
GetFileAttributesA
GetCommandLineA
SetCurrentDirectoryA
CreateSemaphoreA
ResumeThread
ReleaseSemaphore
EnterCriticalSection
LeaveCriticalSection
CreateEventA
GetFullPathNameA
FindResourceA
LoadResource
LockResource
CreateThread
GetModuleFileNameA
Sleep
GetProfileStringA
CreateFileA
WriteFile
ReadFile
GetLastError
WaitForMultipleObjects
SetEvent
GlobalAlloc
WaitForSingleObject
CloseHandle
MulDiv
GetCurrentThreadId
ExitProcess
GetModuleHandleA
GetProcAddress
LoadLibraryA
FreeLibrary
GlobalSize
GlobalLock
GlobalFree
DeleteCriticalSection
HeapSize
GetLocalTime
GetSystemTime
GetTimeZoneInformation
RaiseException
TerminateProcess
RtlUnwind
GetStartupInfoA
SetErrorMode
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
GetFileTime
GetFileSize
GlobalFlags
InitializeCriticalSection
GetVersionExA
lstrcatA
lstrlenA
WinExec
lstrcpyA
FindFirstFileA
FindNextFileA
FindClose
FileTimeToLocalFileTime
FileTimeToSystemTime
FormatMessageA
LocalFree
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GetVolumeInformationA
GetTickCount
GlobalUnlock
GlobalReAlloc
HeapFree
HeapReAlloc
GetProcessHeap
HeapAlloc
GetCurrentThread
user32
GetSystemMetrics
RedrawWindow
InvalidateRect
EnableWindow
wsprintfA
IsWindowVisible
FillRect
OffsetRect
GetClientRect
PtInRect
SetParent
GetParent
GetWindowRect
IsRectEmpty
IsWindow
DestroyIcon
IntersectRect
SetRect
InflateRect
SetScrollPos
SetScrollRange
SendMessageA
GetWindowLongA
SetWindowLongA
GetScrollRange
PostMessageA
SetCapture
GetCapture
GetSysColor
LoadCursorA
BeginPaint
ReleaseCapture
SetTimer
KillTimer
WinHelpA
LoadBitmapA
CopyRect
GetFocus
ChildWindowFromPointEx
ScreenToClient
GetMessagePos
UpdateWindow
SetWindowRgn
DestroyCursor
DestroyAcceleratorTable
IsChild
GetWindow
GetTopWindow
GetActiveWindow
SetWindowPos
SetFocus
DestroyMenu
SetActiveWindow
IsIconic
PeekMessageA
SetMenu
GetMenu
SetCursorPos
GetCursorPos
DefWindowProcA
SetForegroundWindow
ValidateRect
MessageBeep
SystemParametersInfoA
TranslateMessage
LoadIconA
CreatePopupMenu
AppendMenuA
ModifyMenuA
CreateMenu
CreateAcceleratorTableA
EqualRect
GetSubMenu
EnableMenuItem
GetDC
ReleaseDC
GetDlgCtrlID
EnumDisplaySettingsA
LoadImageA
MessageBoxA
CreateIconFromResourceEx
CreateIconFromResource
DrawIconEx
DrawFrameControl
DrawEdge
DrawFocusRect
GetWindowPlacement
RegisterWindowMessageA
GetForegroundWindow
GetLastActivePopup
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
UnhookWindowsHookEx
SetPropA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
CreateWindowExA
DestroyWindow
GetWindowTextA
GetWindowTextLengthA
GetDlgItem
GetMenuItemID
GetMenuItemCount
RegisterClassA
GetScrollPos
AdjustWindowRectEx
MapWindowPoints
SendDlgItemMessageA
CharUpperA
ScrollWindowEx
IsDialogMessageA
SetWindowTextA
MoveWindow
GetWindowDC
UnregisterClassA
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
GetNextDlgTabItem
CheckMenuItem
SetMenuItemBitmaps
GetMenuState
GetMenuCheckMarkDimensions
CreateDialogIndirectParamA
EndDialog
GetClassNameA
GetDesktopWindow
CharNextA
SetWindowContextHelpId
MapDialogRect
GetSysColorBrush
LoadStringA
GetNextDlgGroupItem
PostThreadMessageA
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetMessageA
DispatchMessageA
SetRectEmpty
RegisterClipboardFormatA
ClientToScreen
WindowFromPoint
ShowWindow
SetCursor
IsWindowEnabled
TranslateAcceleratorA
GetKeyState
CopyAcceleratorTableA
PostQuitMessage
IsZoomed
GetSystemMenu
DeleteMenu
GetClassInfoA
gdi32
StartDocA
GetSystemPaletteEntries
CreatePalette
SelectPalette
RealizePalette
GetDIBits
SetBkColor
CreatePolygonRgn
GetWindowExtEx
GetViewportOrgEx
GetWindowOrgEx
SetStretchBltMode
StretchBlt
CreateDIBitmap
GetClipRgn
SelectClipRgn
DeleteObject
LPtoDP
CreateRectRgnIndirect
DeleteDC
BeginPath
EndPath
PathToRegion
CreateEllipticRgn
CreateRoundRectRgn
EndDoc
GetTextColor
GetBkMode
GetBkColor
GetROP2
GetPolyFillMode
StartPage
EndPage
CreateCompatibleBitmap
CreateDCA
GetDeviceCaps
DPtoLP
CreateBitmap
CreateCompatibleDC
SelectObject
BitBlt
GetObjectA
CreatePen
PatBlt
Rectangle
Ellipse
RoundRect
FillRgn
GetCurrentObject
CreateRectRgn
CombineRgn
GetTextExtentPoint32A
CreateSolidBrush
GetStockObject
CreateFontIndirectA
GetTextMetricsA
GetClipBox
SetTextColor
SaveDC
RestoreDC
SetBkMode
SetPolyFillMode
SetROP2
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
ExcludeClipRect
MoveToEx
LineTo
GetStretchBltMode
GetMapMode
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetViewportExtEx
ExtSelectClipRgn
winmm
midiStreamRestart
midiStreamClose
midiOutReset
midiStreamStop
midiStreamOut
midiOutPrepareHeader
midiStreamProperty
midiStreamOpen
midiOutUnprepareHeader
waveOutOpen
waveOutGetNumDevs
waveOutClose
waveOutReset
waveOutPause
waveOutWrite
waveOutPrepareHeader
waveOutUnprepareHeader
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegCloseKey
RegQueryValueA
RegOpenKeyExA
RegSetValueExA
shell32
ShellExecuteA
Shell_NotifyIconA
ole32
CreateILockBytesOnHGlobal
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoTaskMemAlloc
CLSIDFromProgID
OleInitialize
OleUninitialize
CLSIDFromString
CoTaskMemFree
oleaut32
VariantCopy
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreate
SysFreeString
OleCreateFontIndirect
VariantChangeType
VariantClear
LoadTypeLi
RegisterTypeLi
UnRegisterTypeLi
SafeArrayGetElemsize
SysAllocStringByteLen
SysAllocStringLen
SysStringLen
VariantTimeToSystemTime
SysAllocString
comctl32
ord17
ImageList_Destroy
oledlg
ord8
ws2_32
inet_ntoa
getpeername
accept
recv
ioctlsocket
recvfrom
WSAAsyncSelect
closesocket
WSACleanup
comdlg32
GetSaveFileNameA
ChooseColorA
GetOpenFileNameA
GetFileTitleA
Sections
.text Size: 448KB - Virtual size: 447KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ