Static task
static1
Behavioral task
behavioral1
Sample
86f135c997e296e6108a71904c4d26c2_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
86f135c997e296e6108a71904c4d26c2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
86f135c997e296e6108a71904c4d26c2_JaffaCakes118
-
Size
455KB
-
MD5
86f135c997e296e6108a71904c4d26c2
-
SHA1
48fd317b4e45288f723eefa07330b81c3422c191
-
SHA256
f94d2ce5cdafb307584173f32bcdc3712819f56ca77236f4ec9b8f7073b72f12
-
SHA512
56c5132ed6c9c22c94b0ff56a5f994b350b744361ebf9f8e13ff4339141721fccb4028a20bcaab44b71d15093445246cd93b098508162b43d893c1bacd3ea8fe
-
SSDEEP
12288:0zvtRORubWwWY7KEafaTzmeWWxCJEnAzhZzTXr6rL:0JMRvwb7puaTzmX+C4AzhZzDr6rL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 86f135c997e296e6108a71904c4d26c2_JaffaCakes118
Files
-
86f135c997e296e6108a71904c4d26c2_JaffaCakes118.exe windows:5 windows x86 arch:x86
63189643152445c271d89f84d5ced8d6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalUnlock
GlobalLock
GlobalAlloc
LockResource
LoadResource
FindResourceA
SetEndOfFile
CopyFileA
GetDriveTypeA
SizeofResource
SetFileAttributesA
FreeResource
FormatMessageA
MulDiv
SetPriorityClass
GetPriorityClass
GetCurrentProcess
GetCurrentProcessId
GetVersion
QueryPerformanceCounter
CompareFileTime
SystemTimeToFileTime
FileTimeToSystemTime
SetCommState
GetCommState
SetCommTimeouts
GetCommTimeouts
ClearCommError
GetOverlappedResult
WaitCommEvent
PurgeComm
GetCurrentThread
SuspendThread
GetCommandLineA
SetCurrentDirectoryA
MoveFileA
FileTimeToLocalFileTime
GetFileTime
GetDiskFreeSpaceExA
WritePrivateProfileStringA
WaitForSingleObject
SetCommMask
CreateEventA
Beep
GetComputerNameA
GetEnvironmentVariableA
GetLocaleInfoA
GetVersionExA
GetExitCodeProcess
GlobalMemoryStatus
GetCurrentThreadId
CreateProcessA
SetEnvironmentVariableA
GlobalFree
HeapAlloc
HeapFree
GetProcessHeap
GetTimeZoneInformation
GetUserDefaultLCID
HeapSize
GetStartupInfoA
HeapCreate
GetModuleFileNameA
VirtualFree
VirtualAlloc
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
RaiseException
LCMapStringA
LCMapStringW
ExitProcess
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
SetErrorMode
GetVolumeInformationA
GetFullPathNameA
RemoveDirectoryA
CreateDirectoryA
GetCurrentDirectoryA
GetWindowsDirectoryA
SearchPathA
GetTempFileNameA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
FindFirstFileA
FindClose
FindNextFileA
GetFileAttributesA
WideCharToMultiByte
DeleteFileA
GetFileSize
WriteFile
MultiByteToWideChar
GetSystemTime
GetDateFormatA
GetTimeFormatA
LoadLibraryA
GetProcAddress
OutputDebugStringA
GetSystemDirectoryA
ReadFile
ExpandEnvironmentStringsA
ResumeThread
CreateThread
lstrcmpA
GetTickCount
GetLocalTime
GetModuleHandleA
Sleep
TerminateProcess
TerminateThread
ReleaseMutex
FreeLibrary
GetTempPathA
lstrcmpiA
lstrcpyA
lstrlenA
lstrcpynA
lstrcatA
OpenMutexA
CreateMutexA
GetLastError
GetPrivateProfileStringA
CreateFileA
CloseHandle
SetFilePointer
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
OpenProcess
DeleteCriticalSection
gdi32
CreatePen
Rectangle
SetTextColor
SetBkMode
StretchBlt
CreateBitmap
SetBkColor
SetPixel
GetPixel
BitBlt
GetDIBits
GetObjectA
GetDeviceCaps
CreateFontIndirectA
CreateCompatibleBitmap
SelectObject
CreateSolidBrush
CreateCompatibleDC
DeleteDC
GetTextMetricsA
GetStockObject
DeleteObject
LPtoDP
user32
DrawTextA
ChangeDisplaySettingsA
CallNextHookEx
MapVirtualKeyA
mouse_event
GetMenuStringA
GetMenuItemInfoA
GetMenu
GetSubMenu
IsMenu
GetSystemMenu
LoadStringA
wvsprintfA
GetWindow
GetClassNameA
GetFocus
SetWindowTextA
GetDoubleClickTime
IsWindowEnabled
GetParent
CheckDlgButton
IsDlgButtonChecked
IsZoomed
IsIconic
EnableWindow
SetWindowPos
SetCursorPos
ShowCursor
FindWindowA
GetClipboardData
IsClipboardFormatAvailable
SetKeyboardState
GetKeyboardState
GetKeyboardLayout
PtInRect
WindowFromPoint
EndPaint
BeginPaint
RegisterClassA
CloseClipboard
GetNextDlgTabItem
EnumWindows
AttachThreadInput
SetActiveWindow
BringWindowToTop
WaitForInputIdle
SendMessageTimeoutA
EnumChildWindows
ExitWindowsEx
GetClientRect
SetWindowLongA
GetWindowLongA
GetDlgItemTextA
GetDlgItem
SetFocus
CreateCursor
LoadIconA
GetSystemMetrics
LoadImageA
LoadCursorA
RegisterClassExA
SetRect
CreateWindowExA
LoadAcceleratorsA
GetMessageA
GetKeyState
PostMessageA
TranslateAcceleratorA
IsDialogMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
SetForegroundWindow
CreatePopupMenu
AppendMenuA
GetCursorPos
TrackPopupMenu
GetMenuItemCount
DestroyMenu
InvalidateRect
GetDesktopWindow
GetWindowRect
GetSysColor
DrawIconEx
ReleaseDC
IsWindowVisible
OpenClipboard
EmptyClipboard
GetWindowThreadProcessId
SetClipboardData
wsprintfA
SendMessageA
UpdateWindow
ShowWindow
IsWindow
MessageBoxA
PostQuitMessage
DestroyWindow
SetWindowsHookExA
UnhookWindowsHookEx
SetTimer
SystemParametersInfoA
keybd_event
GetClassInfoExA
GetDC
GetClassInfoA
MoveWindow
GetTopWindow
GetAsyncKeyState
GetWindowTextA
KillTimer
GetForegroundWindow
advapi32
RegCloseKey
RegQueryInfoKeyA
GetUserNameA
RegDeleteValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegEnumKeyExA
RegDeleteKeyA
RegEnumKeyA
RegEnumValueA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
ChangeServiceConfigA
StartServiceA
ControlService
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
comdlg32
GetOpenFileNameA
GetSaveFileNameA
comctl32
ImageList_Draw
ord17
InitCommonControlsEx
shell32
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHFileOperationA
FindExecutableA
SHChangeNotify
ExtractIconExA
SHGetPathFromIDListA
ShellExecuteA
SHGetMalloc
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
ole32
CoInitialize
CoUninitialize
OleUninitialize
CLSIDFromProgID
OleInitialize
CreateStreamOnHGlobal
CoCreateInstance
oleaut32
SafeArrayGetElement
VariantClear
SysAllocString
SafeArrayGetUBound
wininet
FtpFindFirstFileA
InternetConnectA
InternetSetOptionA
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
InternetCheckConnectionA
InternetGetConnectedState
InternetAutodial
InternetFindNextFileA
FtpRemoveDirectoryA
FtpCreateDirectoryA
HttpQueryInfoA
InternetWriteFile
InternetReadFile
FtpOpenFileA
FtpDeleteFileA
FtpSetCurrentDirectoryA
ws2_32
WSAStartup
gethostbyname
shutdown
select
setsockopt
WSASocketA
inet_ntoa
recvfrom
sendto
socket
getservbyname
htons
connect
WSACleanup
recv
WSAGetLastError
send
closesocket
odbc32
ord31
ord10
ord57
ord2
ord43
ord13
ord54
ord24
ord6
ord18
ord11
ord45
ord7
ord50
ord1
ord9
Sections
.text Size: 318KB - Virtual size: 318KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ