Static task
static1
Behavioral task
behavioral1
Sample
8742915efc447d517662e1140b5927db_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8742915efc447d517662e1140b5927db_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8742915efc447d517662e1140b5927db_JaffaCakes118
-
Size
260KB
-
MD5
8742915efc447d517662e1140b5927db
-
SHA1
ea47807a0d041f5163717c0c842e32bde4c239aa
-
SHA256
4995b8434b3c06f008e921057e267b510df2e98e52ea6cf8d091484b227b1962
-
SHA512
b464c858ee92c59f8ed5d2780a87d76b5e342739272781c91ad6c12dcaaac21e4bc57c078d6f3f09bc8da09277c9f7d4994ddff5604eaee588883be0c26a4a16
-
SSDEEP
6144:isb2jEDqLnupp7XuxkAXaze8bzpz34FShscA1auY:xbnpM0Npz37hsHK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8742915efc447d517662e1140b5927db_JaffaCakes118
Files
-
8742915efc447d517662e1140b5927db_JaffaCakes118.exe windows:4 windows x86 arch:x86
78f0c7cab689f022e09b0873067f543b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetFolderPathA
SHGetSpecialFolderPathA
shlwapi
PathAppendA
PathGetArgsA
PathFindFileNameA
PathFindExtensionA
SHGetValueA
PathStripToRootA
PathIsUNCA
PathFileExistsA
PathIsDirectoryA
iphlpapi
GetAdaptersInfo
kernel32
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
WriteFile
GetStdHandle
SetHandleCount
SetStdHandle
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
ReadFile
GetCPInfo
GetACP
GetOEMCP
InitializeCriticalSection
HeapSize
RaiseException
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
InterlockedDecrement
GetStringTypeW
GetLocaleInfoA
SetEndOfFile
SetEnvironmentVariableA
LocalFree
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
FindClose
FindNextFileA
FindFirstFileA
LockFile
UnlockFile
GetFileSize
GetThreadLocale
DuplicateHandle
GetFullPathNameA
GlobalGetAtomNameA
LocalAlloc
GlobalReAlloc
GlobalHandle
LocalReAlloc
GetFileTime
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalFlags
GetCurrentDirectoryA
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
GetProcessHeap
GetCommandLineA
GetFileType
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
HeapReAlloc
GetModuleHandleA
VirtualAlloc
HeapAlloc
HeapFree
OutputDebugStringA
CreateMutexA
RemoveDirectoryA
Sleep
GetTempPathA
CopyFileA
SetCurrentDirectoryA
GetSystemTimeAsFileTime
SystemTimeToFileTime
ExitProcess
lstrcpyA
SetLastError
GetVolumeInformationA
GetComputerNameA
DeleteFileA
GetFileAttributesA
lstrcmpA
GetVersionExA
GetModuleFileNameA
DeviceIoControl
GetShortPathNameA
GetCurrentProcess
SetPriorityClass
CreateFileA
GetVersion
CompareStringA
LockResource
lstrcmpiA
GetLastError
InterlockedExchange
MultiByteToWideChar
CompareStringW
SizeofResource
WideCharToMultiByte
LoadResource
lstrlenA
FindResourceA
CloseHandle
LoadLibraryA
GetProcAddress
TerminateProcess
OpenProcess
WaitForSingleObject
FreeLibrary
GetStringTypeA
GetDriveTypeA
user32
SetWindowTextA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
PostQuitMessage
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetParent
GetWindowLongA
GetLastActivePopup
DestroyMenu
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
SendMessageA
GetKeyState
PeekMessageA
ValidateRect
GetSystemMetrics
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ClientToScreen
GetMenu
UnregisterClassA
GetWindowThreadProcessId
PostMessageA
EnumWindows
FindWindowExA
CharUpperA
SendMessageTimeoutA
RegisterWindowMessageA
GetWindow
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowTextA
MessageBoxA
GetDesktopWindow
FindWindowA
SetWindowPos
gdi32
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
RestoreDC
SaveDC
DeleteObject
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
SetViewportOrgEx
SelectObject
ExtTextOutA
GetDeviceCaps
TextOutA
RectVisible
PtVisible
SetMapMode
Escape
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
ole32
StringFromIID
CoGetMalloc
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ