Static task
static1
Behavioral task
behavioral1
Sample
869f5d7d286fd7de9d538e0ba148455a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
869f5d7d286fd7de9d538e0ba148455a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
869f5d7d286fd7de9d538e0ba148455a_JaffaCakes118
-
Size
588KB
-
MD5
869f5d7d286fd7de9d538e0ba148455a
-
SHA1
56441b272a48fbb7b169d2cb5e73f8785d23cc1f
-
SHA256
8825ba4ac1a699bbfad930266f3c8b169ee1b19185d692a235a95565ac58837f
-
SHA512
b8c4f525aed8e7a333399191278b796ef010457b69787ea6644c56c23219c2da8ec67b56d2644fbcb11252cf00e9be2e69c175024ee78c4388434a586cb721fc
-
SSDEEP
12288:1YF9zEuRaSdpJTfeSPkVoQKvu8KTr+yvXUm8:cislVkCQKvoTrtvr8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 869f5d7d286fd7de9d538e0ba148455a_JaffaCakes118
Files
-
869f5d7d286fd7de9d538e0ba148455a_JaffaCakes118.exe windows:4 windows x86 arch:x86
6595eb067f92a54488f6e9023753b895
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
iphlpapi
GetAdaptersInfo
shlwapi
PathStripToRootA
PathRemoveExtensionA
PathFileExistsA
SHGetValueA
PathFindExtensionA
StrToIntA
PathIsUNCA
PathFindFileNameA
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyA
SetSecurityDescriptorDacl
RegOpenKeyA
RegDeleteKeyA
kernel32
DeleteFileA
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
GetThreadLocale
DuplicateHandle
FindClose
FindFirstFileA
GetFullPathNameA
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameW
FindNextFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
TlsGetValue
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
WritePrivateProfileStringA
GetCurrentDirectoryA
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
GlobalGetAtomNameA
GetFileAttributesA
GetFileTime
GetSystemTimeAsFileTime
HeapAlloc
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
GetStartupInfoA
WriteConsoleW
GetFileType
GetStdHandle
RtlUnwind
ExitThread
CreateThread
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
GetConsoleCP
GetConsoleMode
Sleep
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetTimeZoneInformation
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
DebugBreak
GetDriveTypeA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
GetStringTypeA
GetStringTypeW
SetEnvironmentVariableA
GlobalFindAtomA
lstrcmpW
GetVersionExA
ReleaseSemaphore
CreateSemaphoreA
GetCurrentProcessId
GlobalAddAtomA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalDeleteAtom
GetModuleHandleA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
MulDiv
CreateEventA
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
RaiseException
LocalAlloc
GetProcessHeap
HeapFree
SetFilePointer
WriteFile
ReadFile
CreateFileA
FreeResource
LocalFree
GetCurrentProcess
SetPriorityClass
DeviceIoControl
GetCurrentThreadId
CreateMutexA
LeaveCriticalSection
EnterCriticalSection
GetVolumeInformationA
DeleteCriticalSection
GetModuleFileNameA
ExitProcess
CopyFileA
GetTempFileNameA
InitializeCriticalSectionAndSpinCount
SetLastError
FreeLibrary
GetVersion
MultiByteToWideChar
InterlockedExchange
CompareStringW
lstrcmpiA
CompareStringA
lstrlenA
LocalFileTimeToFileTime
DosDateTimeToFileTime
FindResourceA
LoadResource
LockResource
SetFileTime
SizeofResource
CloseHandle
SystemTimeToFileTime
WideCharToMultiByte
CompareFileTime
GetProcAddress
LoadLibraryA
GetTempPathA
GetLastError
CreateDirectoryA
user32
BeginPaint
EndPaint
DestroyMenu
UnregisterClassA
IsDialogMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
GetLastActivePopup
MessageBoxA
SetCursor
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ClientToScreen
LoadCursorA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
SendMessageA
GetKeyState
PeekMessageA
ValidateRect
wsprintfA
GetParent
GetClassNameA
WaitForInputIdle
BringWindowToTop
GetWindowThreadProcessId
SetWindowTextA
GetClientRect
GetSystemMetrics
SendMessageTimeoutA
EnumChildWindows
EnumThreadWindows
EnableWindow
SetParent
PostMessageA
SetTimer
RegisterWindowMessageA
EnumWindows
GetWindowTextA
GetCursorPos
CharUpperA
GetDC
ReleaseDC
GetSysColorBrush
CopyRect
ShowWindow
CheckMenuItem
gdi32
SetTextColor
GetClipBox
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
ExtTextOutA
CreateBitmap
GetDeviceCaps
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
DeleteObject
GetObjectA
SetBkColor
Escape
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
ole32
CoInitialize
CoGetMalloc
CoUninitialize
CoInitializeEx
CoCreateInstance
CoDisconnectObject
OleRun
oleaut32
LoadTypeLi
VariantClear
SysFreeString
SysAllocString
SysAllocStringLen
VariantInit
VariantCopy
GetErrorInfo
VariantChangeType
SysStringLen
SysAllocStringByteLen
Sections
.text Size: 468KB - Virtual size: 467KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 744B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ