Static task
static1
Behavioral task
behavioral1
Sample
0033d47d44ee440f0927aa765513d040_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0033d47d44ee440f0927aa765513d040_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
0033d47d44ee440f0927aa765513d040_JaffaCakes118
-
Size
391KB
-
MD5
0033d47d44ee440f0927aa765513d040
-
SHA1
3f054b4f6606933b4e34dcca5b1cff9a78a04f3a
-
SHA256
d1dffbf7a553469cff8d30580dba993b6e85a54f4cd4c0cd8fcebae435c172e5
-
SHA512
52be48603a40083859bc41e25ac497fd02dca12c3ccf055d4edbc553caf7cb365b9f034efbbf617ccbb44fbd5b6b1292b60d6866f67d168a5abebb0cef882c8a
-
SSDEEP
6144:Wjx0E81BZJCOfvX5OIWRfggACPEVDb7W9zzFg1gJgpUKOAXCGeazR:rvBbfvp0fAF7xUUyWt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0033d47d44ee440f0927aa765513d040_JaffaCakes118
Files
-
0033d47d44ee440f0927aa765513d040_JaffaCakes118.exe windows:5 windows x86 arch:x86
f04d3067c4d162fc99ed5b7fcaf8caf0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
VirtualAllocEx
GetModuleHandleW
CloseHandle
WritePrivateProfileStringW
WriteFile
WaitForSingleObject
VerifyVersionInfoW
VerSetConditionMask
UnhandledExceptionFilter
TerminateThread
TerminateProcess
Sleep
SetUnhandledExceptionFilter
SetLastError
SetFilePointer
SetFileAttributesW
SetEvent
SetCurrentDirectoryW
ReleaseSemaphore
ReleaseMutex
ReadFile
QueryPerformanceCounter
MultiByteToWideChar
LockResource
LocalFree
LoadResource
LoadLibraryW
LeaveCriticalSection
InitializeCriticalSection
HeapFree
HeapAlloc
GlobalFree
GetWindowsDirectoryW
GetVolumePathNameW
GetVolumeNameForVolumeMountPointW
GetVolumeInformationW
GetVersionExW
GetUserDefaultLCID
GetTimeFormatW
GetTickCount
GetTapeParameters
GetSystemTimeAsFileTime
GetSystemTime
GetSystemDirectoryW
GetStartupInfoW
GetProcessHeap
GetProcAddress
GetPrivateProfileStringW
GetModuleHandleA
GetModuleFileNameW
GetLogicalDriveStringsW
GetLocaleInfoW
GetLastError
GetFileInformationByHandle
GetFileAttributesW
GetExitCodeThread
GetEnvironmentVariableW
GetDriveTypeW
GetDiskFreeSpaceExW
GetDateFormatW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetComputerNameW
FreeLibrary
FormatMessageW
FlushFileBuffers
FindResourceW
FindNextFileW
FindFirstFileW
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
ExpandEnvironmentStringsW
EnterCriticalSection
DeviceIoControl
DeleteFileW
DeleteCriticalSection
CreateThread
CreateSemaphoreW
CreateProcessW
CreateMutexW
CreateFileW
CreateEventW
CreateDirectoryW
user32
CreatePopupMenu
CreateMenu
CloseClipboard
GetCaretBlinkTime
GetKeyboardType
IsCharLowerA
IsMenu
IsCharUpperW
GetClipboardData
GetMessagePos
GetSysColorBrush
IsClipboardFormatAvailable
LoadIconA
CopyIcon
wvsprintfW
wsprintfW
WindowFromPoint
UpdateWindow
UnregisterClassW
UnhookWindowsHookEx
SystemParametersInfoW
ShowWindow
SetWindowsHookExW
SetWindowTextW
SetWindowPos
SetWindowLongW
SetTimer
SetParent
SetCursor
SetClassLongW
SetActiveWindow
SendMessageW
SendDlgItemMessageW
ScreenToClient
RemoveMenu
ReleaseDC
PostQuitMessage
PostMessageW
PeekMessageW
MonitorFromWindow
MessageBoxW
MapDialogRect
LockSetForegroundWindow
LoadStringW
LoadMenuW
LoadIconW
LoadCursorW
LoadBitmapW
KillTimer
IsWindowVisible
IsWindow
IsIconic
IsCharAlphaW
IsCharAlphaNumericW
InvalidateRgn
InvalidateRect
InflateRect
GetWindowThreadProcessId
GetWindowTextW
GetWindowTextLengthW
GetWindowRect
GetWindowLongW
GetWindow
GetSystemMetrics
GetSysColor
GetSubMenu
GetParent
GetNextDlgGroupItem
GetMonitorInfoW
GetMenuItemID
GetMenuItemCount
GetMenu
GetKeyState
GetIconInfo
GetFocus
GetDlgItem
GetDesktopWindow
GetDC
GetCursorPos
GetClientRect
GetCapture
GetAsyncKeyState
GetActiveWindow
FlashWindow
ExitWindowsEx
EnableWindow
EnableMenuItem
DrawFocusRect
DestroyWindow
DestroyIcon
DeleteMenu
DefWindowProcW
CreateIconIndirect
CreateIconFromResource
CreateDialogParamW
CopyRect
ClientToScreen
ChildWindowFromPoint
CallNextHookEx
BringWindowToTop
AppendMenuW
LoadImageW
gdi32
DeleteObject
GetStockObject
CloseEnhMetaFile
AddFontResourceW
CreateHalftonePalette
CancelDC
GetStretchBltMode
GetROP2
DeleteDC
CreatePatternBrush
CreateSolidBrush
DeleteEnhMetaFile
EndPath
GetGraphicsMode
AbortPath
WidenPath
SelectObject
Rectangle
Polygon
PatBlt
GetTextExtentPoint32W
GetObjectW
BitBlt
CreateRectRgn
CreateFontIndirectW
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
CombineRgn
GetMapMode
comdlg32
GetSaveFileNameW
GetOpenFileNameW
GetFileTitleW
advapi32
GetAce
WriteEncryptedFileRaw
StartServiceW
SetSecurityDescriptorDacl
SetFileSecurityW
SetEntriesInAclW
ReportEventW
RegisterEventSourceW
RegUnLoadKeyW
RegSetValueExW
RegSaveKeyW
RegRestoreKeyW
RegReplaceKeyW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyW
RegOpenKeyExW
RegOpenKeyExA
RegLoadKeyW
RegFlushKey
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegCreateKeyExW
RegConnectRegistryW
RegCloseKey
ReadEncryptedFileRaw
AddAccessAllowedAce
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
CloseEncryptedFileRaw
QueryServiceStatus
CloseServiceHandle
ControlService
DecryptFileW
DeleteAce
EncryptFileW
EnumDependentServicesW
EqualSid
FreeSid
GetSecurityDescriptorDacl
GetTokenInformation
GetUserNameW
InitializeAcl
InitializeSecurityDescriptor
LookupAccountSidW
LookupPrivilegeValueW
OpenEncryptedFileRawW
OpenProcessToken
OpenSCManagerW
OpenServiceW
OpenThreadToken
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetFolderPathW
SHGetFileInfoW
SHGetDesktopFolder
ExtractIconExW
SHGetMalloc
ole32
StringFromGUID2
CoUninitialize
CoTaskMemFree
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
CoCreateGuid
CLSIDFromString
msvcrt
_wcsdup
wprintf
wcstok
wcsstr
wcsrchr
wcspbrk
wcsncpy
wcsncmp
wcsncat
_CxxThrowException
_XcptFilter
__CxxFrameHandler
__dllonexit
__p__commode
__p__fmode
__set_app_type
__setusermatherr
__wgetmainargs
_adjust_fdiv
_c_exit
_cexit
_controlfp
_errno
_except_handler3
_exit
_fdopen
_filelength
_ftol
_getpid
_initterm
_local_unwind2
_mbscpy
_mbslen
_onexit
_open_osfhandle
_purecall
_putenv
_snwprintf
_tzset
_vsnwprintf
_wcmdln
_wcsicmp
_wcslwr
_wcsnicmp
_wcsrev
_wcsupr
_wfopen
_wtoi
calloc
clearerr
exit
fclose
fflush
fread
free
fseek
ftell
fwrite
isalpha
isspace
localtime
malloc
memmove
mktime
realloc
swprintf
swscanf
time
wcscat
wcschr
wcscmp
wcscpy
wcslen
Sections
.text Size: 362KB - Virtual size: 362KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ