Static task
static1
Behavioral task
behavioral1
Sample
825985f10ce283b56bb6ea70373128b5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
825985f10ce283b56bb6ea70373128b5_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
825985f10ce283b56bb6ea70373128b5_JaffaCakes118
-
Size
1.2MB
-
MD5
825985f10ce283b56bb6ea70373128b5
-
SHA1
aa205556895b75b1f6cf36342689a9bde1536017
-
SHA256
9d8eefb651c69fd348de1a632bda051b86eba380a50ec89fc938b1dc1965d02e
-
SHA512
698f203e740bf9c95b89b13014b05c2d74fb163070352b62e04472dca15ad42c259a33e1620d28ec61dfa1318350f7a678ec3aa9a905087222ef90219e680184
-
SSDEEP
12288:AZ16fdJYcy+KRewAiQZtGIpKalEBd3DRNLaH3R2UmeDuUl5pev4GSfOAzvBT8kv:+wlbcBTNLaH3R2UmKkv4GS2QT8s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 825985f10ce283b56bb6ea70373128b5_JaffaCakes118
Files
-
825985f10ce283b56bb6ea70373128b5_JaffaCakes118.exe windows:4 windows x86 arch:x86
00fe79ab3bfc651952b47535c092ed03
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
shlwapi
PathFindExtensionA
SHDeleteKeyA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
kernel32
GetCurrentProcessId
ReadFile
SetFilePointer
LockFile
UnlockFile
SetEndOfFile
GetThreadLocale
DuplicateHandle
GetVolumeInformationA
GlobalFlags
GetModuleFileNameW
InterlockedDecrement
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
SetErrorMode
GetCPInfo
GetOEMCP
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
ExitProcess
HeapReAlloc
VirtualAlloc
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
HeapSize
SetStdHandle
GetFileType
GetACP
LCMapStringA
LCMapStringW
GetStdHandle
GetStringTypeA
GetStringTypeW
VirtualFree
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalUnlock
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GlobalLock
OpenMutexA
CreateMutexA
FindResourceExA
GetUserDefaultLangID
FormatMessageA
LocalFree
GetStartupInfoA
CreateProcessA
GetExitCodeProcess
CreateDirectoryA
FlushFileBuffers
GlobalAlloc
GlobalFree
HeapFree
GetProcessHeap
HeapAlloc
QueryDosDeviceA
GetFileTime
CompareFileTime
WritePrivateProfileStringA
lstrcmpA
Sleep
GetDriveTypeA
SetLastError
GetVersionExA
GetSystemDirectoryA
GetShortPathNameA
GetTempPathA
GetLocaleInfoA
GetSystemDefaultLangID
InitializeCriticalSection
GetFileSize
DeleteCriticalSection
QueryPerformanceCounter
QueryPerformanceFrequency
WriteFile
OutputDebugStringA
CreateFileA
GetEnvironmentVariableA
CompareStringW
CompareStringA
GetVersion
InterlockedExchange
CopyFileA
DeleteFileA
GetCommandLineA
OpenProcess
WaitForSingleObject
TerminateProcess
SetFileAttributesA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetWindowsDirectoryA
FindFirstFileA
FindNextFileA
FindClose
CloseHandle
GetPrivateProfileStringA
GetCurrentDirectoryA
lstrlenA
GetProcAddress
GetCurrentProcess
FreeLibrary
LoadLibraryA
GlobalAddAtomA
GlobalDeleteAtom
GetCurrentThreadId
GetTickCount
GetLastError
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleA
GetModuleFileNameA
GetFullPathNameA
GetFileAttributesA
MultiByteToWideChar
RtlUnwind
user32
UnregisterClassA
DestroyMenu
LoadCursorA
GetSysColorBrush
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
ShowWindow
GetDlgItem
AdjustWindowRectEx
UnhookWindowsHookEx
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
GetWindowTextA
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetSysColor
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
MessageBoxA
WaitForInputIdle
MsgWaitForMultipleObjects
PostQuitMessage
EnumWindows
GetWindowThreadProcessId
SetWindowTextA
GetSystemMetrics
CharUpperA
IsWindow
SetForegroundWindow
SetWindowPos
GetWindowLongA
GetDC
SetWindowLongA
ReleaseDC
PeekMessageA
TranslateMessage
DispatchMessageA
PostMessageA
SendMessageA
RegisterWindowMessageA
gdi32
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
GetStockObject
CreateBitmap
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
GetClipBox
SetMapMode
SetTextColor
ScaleViewportExtEx
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegQueryValueA
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyA
RegCreateKeyExA
RegOpenKeyA
RegDeleteKeyA
RegOpenKeyExA
RegEnumKeyA
RegSetValueExA
RegDeleteValueA
RegQueryInfoKeyA
RegEnumValueA
RegQueryValueExA
ole32
CoInitialize
CoUninitialize
oleaut32
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 296KB - Virtual size: 294KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 720KB - Virtual size: 718KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.1rdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE