Static task
static1
Behavioral task
behavioral1
Sample
8c5b2ef0cdd7e64e3362f40f74ae34bf_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8c5b2ef0cdd7e64e3362f40f74ae34bf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8c5b2ef0cdd7e64e3362f40f74ae34bf_JaffaCakes118
-
Size
491KB
-
MD5
8c5b2ef0cdd7e64e3362f40f74ae34bf
-
SHA1
54a1601494b2702c6894e119f87fc0a8b6b2e6aa
-
SHA256
931176798eed704d2742acd4ba5aa3b44114a4d6e2a9d11b4ed1a50b933718e6
-
SHA512
da6d403c29a8e23a1954095585166d132a73e3a2c55a1a66fc3e7d80b84585784b7f28445a7a3e2c0b56c173810f080217efa3a3d70e12327927598cef6dde07
-
SSDEEP
6144:QPCr+NhQQp/8mNNav4Ym7HcQq2ZTOenph6kFmRSOyJ8qBlWFDtdzzxivD1:qEyFlXNJY6cQq2ZCenMRSl8qetib1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c5b2ef0cdd7e64e3362f40f74ae34bf_JaffaCakes118
Files
-
8c5b2ef0cdd7e64e3362f40f74ae34bf_JaffaCakes118.exe windows:4 windows x86 arch:x86
1a9af7a44f1581b3c3870b63c94c8c47
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
__WSAFDIsSet
recv
send
socket
connect
closesocket
bind
select
accept
htons
sendto
recvfrom
ntohs
WSAGetLastError
ioctlsocket
WSACleanup
inet_addr
gethostbyname
WSAStartup
gethostname
listen
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
winmm
waveOutSetVolume
timeGetTime
mciSendStringW
comctl32
ImageList_Remove
ImageList_Destroy
ImageList_EndDrag
ImageList_DragLeave
ImageList_DragMove
ImageList_DragEnter
ImageList_BeginDrag
ImageList_SetDragCursorImage
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
mpr
WNetUseConnectionW
WNetGetConnectionW
WNetAddConnection2W
WNetCancelConnection2W
kernel32
QueryPerformanceCounter
QueryPerformanceFrequency
UnmapViewOfFile
OpenProcess
CreateFileMappingW
MapViewOfFile
WriteProcessMemory
ReadProcessMemory
SetFilePointer
TerminateProcess
WaitForSingleObject
SetFileTime
GetFileAttributesW
FindFirstFileW
FindClose
DeleteFileW
FindNextFileW
lstrcmpiW
MoveFileW
CopyFileW
GetLastError
CreateDirectoryW
RemoveDirectoryW
SetSystemPowerState
FindResourceW
LoadResource
LockResource
SizeofResource
EnumResourceNamesW
OutputDebugStringW
GetLocalTime
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
FormatMessageW
GetExitCodeProcess
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileSectionW
WritePrivateProfileSectionW
GetPrivateProfileSectionNamesW
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetDriveTypeW
SetErrorMode
GetModuleHandleW
GetVolumeInformationW
SetVolumeLabelW
DeviceIoControl
SetFileAttributesW
GetShortPathNameW
GetEnvironmentVariableW
SetEnvironmentVariableW
SetProcessWorkingSetSize
GlobalMemoryStatus
Beep
GetComputerNameW
GetWindowsDirectoryW
GetSystemDirectoryW
GetTempPathW
GetCurrentProcessId
CreatePipe
DuplicateHandle
GetStdHandle
SetPriorityClass
WriteFile
GetFileType
PeekNamedPipe
SetLastError
GetTempPathA
GetTempFileNameA
DeleteFileA
CopyFileA
CreateFileA
ExitThread
GetModuleHandleA
ExitProcess
HeapFree
HeapAlloc
GetVersionExA
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
DeleteCriticalSection
HeapReAlloc
HeapSize
VirtualProtect
VirtualAlloc
VirtualQuery
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
SetHandleCount
GetStartupInfoA
SetStdHandle
FlushFileBuffers
GetSystemInfo
GetCurrentProcess
GetVersionExW
GlobalFindAtomW
LoadLibraryW
LoadLibraryExW
GlobalFree
GlobalUnlock
ReadFile
GlobalLock
GlobalAlloc
GetFileSize
CreateFileW
CloseHandle
CreateProcessW
GetCurrentThreadId
Sleep
GetProcAddress
LoadLibraryA
RaiseException
GetTimeZoneInformation
GetModuleFileNameA
FreeLibrary
GetModuleFileNameW
GetFullPathNameW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateThread
ResumeThread
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStartupInfoW
GetCommandLineA
GetCommandLineW
LCMapStringA
LCMapStringW
GetCPInfo
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
RtlUnwind
GetACP
GetOEMCP
InitializeCriticalSection
GetTickCount
InterlockedExchange
SetEndOfFile
CompareStringA
CompareStringW
GetDiskFreeSpaceW
SetEnvironmentVariableA
user32
PeekMessageW
TranslateMessage
DispatchMessageW
GetMessageW
CharLowerBuffW
CharUpperW
OpenClipboard
IsClipboardFormatAvailable
GetClipboardData
CloseClipboard
CountClipboardFormats
EmptyClipboard
SetClipboardData
GetCursor
RegisterHotKey
GetKeyboardLayoutNameW
IsCharAlphaW
IsCharAlphaNumericW
IsCharLowerW
IsCharUpperW
GetMenuStringW
GetSubMenu
GetCaretPos
IsZoomed
FlashWindow
CopyImage
GetWindowTextLengthW
SetMenuDefaultItem
SetMenu
CreateMenu
DeleteMenu
DestroyMenu
DrawMenuBar
SetMenuItemInfoW
GetDC
SetWindowPos
SetWindowLongW
RedrawWindow
wsprintfW
CharNextW
IsMenu
GetActiveWindow
LockWindowUpdate
UnregisterHotKey
DestroyWindow
SetClassLongW
AdjustWindowRectEx
SetRect
SystemParametersInfoW
GetSystemMetrics
ReleaseDC
GetWindowDC
GetAsyncKeyState
MessageBeep
keybd_event
FillRect
OffsetRect
FrameRect
DrawTextW
DrawFocusRect
InflateRect
GetSysColor
CheckMenuRadioItem
GetMenuItemID
GetMenuItemCount
GetMenuItemInfoW
SetWindowTextW
ReleaseCapture
SetCapture
ClientToScreen
GetKeyState
WindowFromPoint
GetClientRect
TrackPopupMenuEx
GetCursorPos
IsDialogMessageW
EnumWindows
GetDesktopWindow
IsWindow
IsWindowEnabled
IsWindowVisible
EnableWindow
ScreenToClient
InvalidateRect
GetWindowLongW
GetWindowThreadProcessId
AttachThreadInput
SendMessageTimeoutW
CreateIconFromResourceEx
mouse_event
ExitWindowsEx
SetActiveWindow
FindWindowExW
EnumThreadWindows
CreateIcon
SetForegroundWindow
IsIconic
FindWindowW
SetKeyboardState
LoadImageW
GetKeyboardState
GetFocus
GetWindowTextW
EnumChildWindows
CharUpperBuffW
GetClassNameW
GetParent
GetDlgCtrlID
SendMessageW
MapVirtualKeyW
PostMessageW
GetWindowRect
DefWindowProcW
MoveWindow
SetFocus
PostQuitMessage
KillTimer
CreatePopupMenu
RegisterWindowMessageW
SetTimer
ShowWindow
CreateWindowExW
RegisterClassExW
VkKeyScanA
GetKeyboardLayoutNameA
MessageBoxW
LoadStringW
DialogBoxParamW
EndDialog
SendDlgItemMessageW
GetMenu
CopyRect
IsChild
GetWindow
GetNextDlgTabItem
GetClassWord
PtInRect
GetDlgItem
LoadIconW
LoadCursorW
GetSysColorBrush
GetForegroundWindow
DestroyIcon
SubtractRect
EndPaint
BeginPaint
DrawFrameControl
InsertMenuItemW
SetCursor
gdi32
PolyBezierTo
ExtCreatePen
StrokeAndFillPath
StrokePath
EndPath
SetPixel
CloseFigure
LineTo
AngleArc
MoveToEx
GetTextExtentPoint32W
CreateDIBSection
BitBlt
GetDIBits
CreateCompatibleBitmap
CreateDCW
GetTextFaceW
Ellipse
PolyDraw
BeginPath
Rectangle
SetViewportOrgEx
GetObjectW
DeleteDC
CreateCompatibleDC
CreateFontW
GetDeviceCaps
GetStockObject
SetBkMode
GetPixel
RoundRect
SetBkColor
SelectObject
CreatePen
CreateSolidBrush
DeleteObject
SetTextColor
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
GetUserNameW
RegConnectRegistryW
RegEnumKeyExW
CloseServiceHandle
UnlockServiceDatabase
LockServiceDatabase
OpenSCManagerW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
shell32
SHBrowseForFolderW
SHFileOperationW
SHGetPathFromIDListW
SHGetDesktopFolder
SHGetMalloc
Shell_NotifyIconW
ExtractIconExW
DragFinish
DragQueryFileW
DragQueryPoint
ShellExecuteW
ShellExecuteExW
ole32
CreateStreamOnHGlobal
OleSetMenuDescriptor
MkParseDisplayName
OleSetContainedObject
CoInitialize
CoUninitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
IIDFromString
StringFromIID
CLSIDFromString
OleInitialize
CreateBindCtx
CLSIDFromProgID
CoInitializeSecurity
CoCreateInstanceEx
CoSetProxyBlanket
StringFromCLSID
OleUninitialize
oleaut32
LoadRegTypeLi
SafeArrayDestroyDescriptor
SafeArrayDestroyData
SafeArrayAllocData
SafeArrayAllocDescriptorEx
SysAllocString
SafeArrayUnaccessData
SafeArrayAccessData
VarR4FromDec
VariantTimeToSystemTime
VariantClear
VariantCopy
VariantInit
OleLoadPicture
GetActiveObject
Sections
.text Size: 348KB - Virtual size: 347KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ