Static task
static1
Behavioral task
behavioral1
Sample
87a99693ab3bd8d7fac125de5b43e556_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
87a99693ab3bd8d7fac125de5b43e556_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
87a99693ab3bd8d7fac125de5b43e556_JaffaCakes118
-
Size
214KB
-
MD5
87a99693ab3bd8d7fac125de5b43e556
-
SHA1
b30271af45683363cbd6b9611f0c11f244a13a23
-
SHA256
b035eab256b4fb122adabeb7abe8b090601d54ba06c3f2e683c90958910ae7d2
-
SHA512
8b14e7e4900c267cc2ba53da48eb602d11de5679dc1accb18d4e5c702a96db890d9c430c5ca9f93eaec72af12769ddcdf472336a83cdad2f27f2a0237238dddb
-
SSDEEP
3072:1KHLQjgX762TAGhE1JMQN4pfLSjBDCMxaWzblcLmajt6jdFFK713X4BT/FU:sHqgX71fYJMtLpSlsx6jdFFK7WDFU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 87a99693ab3bd8d7fac125de5b43e556_JaffaCakes118
Files
-
87a99693ab3bd8d7fac125de5b43e556_JaffaCakes118.exe windows:4 windows x86 arch:x86
80374f09f291205941fdc8519b7d2084
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
DragFinish
SHAddToRecentDocs
SHLoadInProc
DragAcceptFiles
SHBrowseForFolderA
SHGetSpecialFolderPathA
SHGetPathFromIDListA
ShellExecuteA
DragQueryPoint
ws2_32
WSAAccept
WSALookupServiceBeginA
shutdown
getservbyname
WSAEnumProtocolsW
comdlg32
PageSetupDlgW
ChooseFontW
kernel32
GetSystemTime
GetACP
GetCommandLineW
GetTapeParameters
LeaveCriticalSection
ReadFile
GetFullPathNameA
GetSystemTimeAsFileTime
GetNumberFormatW
FlushConsoleInputBuffer
GetTempPathW
CreateNamedPipeW
SetupComm
ScrollConsoleScreenBufferA
ClearCommBreak
SetEvent
EnumCalendarInfoW
AreFileApisANSI
GetLogicalDriveStringsA
MoveFileExA
GetProcessHeap
GlobalAddAtomW
SetMailslotInfo
GetVersion
QueryDosDeviceA
EnumSystemCodePagesA
RaiseException
GetConsoleCursorInfo
GetSystemTimeAdjustment
GetComputerNameW
EndUpdateResourceA
GetCurrentProcessId
SetCommTimeouts
_lclose
MoveFileW
GetFileAttributesExA
GetCommConfig
GetAtomNameA
GlobalFlags
SetConsoleTitleA
PrepareTape
CreateIoCompletionPort
IsDBCSLeadByteEx
lstrcpynA
GlobalGetAtomNameW
FillConsoleOutputCharacterA
OpenFile
IsBadReadPtr
GetProfileStringA
LoadLibraryExA
AllocConsole
SizeofResource
QueryDosDeviceW
WaitNamedPipeA
WriteFile
FreeLibraryAndExitThread
CreateFileW
RemoveDirectoryW
CreateEventA
GetModuleFileNameW
FlushFileBuffers
FindFirstFileExW
CreateDirectoryW
GetEnvironmentStringsW
EnumResourceNamesW
GlobalDeleteAtom
SetThreadAffinityMask
GetEnvironmentVariableW
GetSystemDefaultLangID
OutputDebugStringA
GetTapeStatus
WritePrivateProfileSectionW
GetShortPathNameW
WriteConsoleOutputW
LocalReAlloc
GetConsoleMode
OpenSemaphoreW
SetProcessShutdownParameters
FindNextChangeNotification
SetEnvironmentVariableW
EraseTape
SetConsoleWindowInfo
_hread
GlobalFindAtomW
lstrcatW
ReadConsoleInputW
WritePrivateProfileStringW
ReadDirectoryChangesW
FatalAppExitA
EnumCalendarInfoA
VirtualQuery
PeekNamedPipe
GetUserDefaultLangID
GetVolumeInformationW
GetShortPathNameA
GlobalReAlloc
SetTimeZoneInformation
ReadFileScatter
IsBadStringPtrA
GetUserDefaultLCID
_lread
CreateDirectoryExA
GetFileInformationByHandle
GlobalAddAtomA
GetProfileIntA
SetConsoleCursorPosition
SetNamedPipeHandleState
GetCommandLineA
VirtualAlloc
ExitProcess
SystemTimeToFileTime
user32
UnregisterClassW
GrayStringW
ToUnicode
DialogBoxParamA
MessageBeep
PostThreadMessageW
OemToCharBuffA
LoadMenuW
CreateWindowExA
ClipCursor
IsDlgButtonChecked
SetMenuInfo
EmptyClipboard
GetKeyNameTextA
SetClipboardData
GetTopWindow
DestroyIcon
CreateDesktopW
DrawCaption
LoadMenuA
CopyRect
DispatchMessageW
MessageBoxExA
OpenWindowStationW
OpenIcon
SendMessageTimeoutW
GetKeyNameTextW
LoadCursorW
IsCharUpperW
IsCharUpperA
AppendMenuA
EnumDisplayMonitors
RedrawWindow
WaitMessage
OffsetRect
SetMessageQueue
SetDlgItemTextW
DrawMenuBar
LoadIconW
WinHelpW
EnumDesktopsW
CreateAcceleratorTableW
CharLowerBuffA
SetWindowPos
EnumClipboardFormats
SetCapture
MenuItemFromPoint
GetAsyncKeyState
PeekMessageA
ChangeDisplaySettingsW
IsCharAlphaNumericA
IsClipboardFormatAvailable
DrawFrameControl
CreateCaret
InsertMenuA
GetMenuItemInfoA
EnumDisplayDevicesA
EndDialog
CreateDialogIndirectParamW
PtInRect
CreateDesktopA
GetCursor
GetMenuItemID
DrawAnimatedRects
GetWindowDC
EnumDisplaySettingsExW
advapi32
ImpersonateSelf
RegOpenKeyA
BuildTrusteeWithSidW
LookupPrivilegeNameA
CreateServiceW
CryptVerifySignatureA
QueryServiceConfigW
RegisterServiceCtrlHandlerW
UnlockServiceDatabase
CryptSetHashParam
RegCreateKeyExA
SetServiceObjectSecurity
GetCurrentHwProfileW
LookupAccountNameA
CryptGetProvParam
GetUserNameA
ReadEventLogW
OpenThreadToken
GetServiceDisplayNameW
CryptGetKeyParam
RegSetValueA
CryptSignHashW
GetTokenInformation
CryptGenRandom
GetFileSecurityA
DuplicateToken
RegSetValueExA
ReportEventA
CryptDeriveKey
RegEnumKeyW
SetEntriesInAclA
RegSaveKeyW
ChangeServiceConfigW
RegOpenKeyExA
StartServiceW
RegisterEventSourceW
OpenSCManagerW
EnumServicesStatusW
EnumServicesStatusA
RegisterEventSourceA
GetNamedSecurityInfoA
StartServiceCtrlDispatcherW
gdi32
GetTextFaceA
GetPaletteEntries
GetTextCharacterExtra
StartDocA
RealizePalette
Rectangle
SetBitmapDimensionEx
GetBitmapBits
PlayEnhMetaFile
CreateDCW
EndDoc
GetDIBits
Polygon
Pie
CreateMetaFileW
Ellipse
GetTextMetricsW
oleaut32
SafeArrayGetLBound
version
VerInstallFileA
ole32
ReadClassStg
CLSIDFromString
CoRegisterMallocSpy
CoSwitchCallContext
OleGetIconOfClass
WriteClassStg
OleCreateMenuDescriptor
msvcrt
wcscmp
_chdir
strchr
_getmbcp
fgetc
rename
_wfopen
fprintf
_umask
_snwprintf
wcslen
isupper
exit
atoi
_wopen
localtime
_wcsrev
_mbschr
strncmp
atol
_pctype
memmove
wscanf
_get_osfhandle
_iob
time
_write
_mbsncmp
__p___argv
vfwprintf
atof
_wsplitpath
_strlwr
_itow
wcstok
putchar
_wcsdup
_ui64tow
_isatty
_wremove
abort
fputc
ungetc
_pipe
_ltow
wcsftime
printf
_wfullpath
_wsystem
_itoa
swprintf
_tell
_close
_fdopen
strtok
_vsnwprintf
_endthread
_wcsnicmp
strtod
Sections
.text Size: 204KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ