Static task
static1
Behavioral task
behavioral1
Sample
884ad82f5e6fa7dafdec3a767bd64ee6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
884ad82f5e6fa7dafdec3a767bd64ee6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
884ad82f5e6fa7dafdec3a767bd64ee6_JaffaCakes118
-
Size
603KB
-
MD5
884ad82f5e6fa7dafdec3a767bd64ee6
-
SHA1
20fd8c9ffa10c63a1f085982efb32c46b8c88cad
-
SHA256
785224b43f2c369f9ad318d8cc70ae5ef55022b3362cb1a4f1fdbf53fbbecf81
-
SHA512
86ac632a224b87c7f1c0c184f4a07c4ad62fbd9d7498b7a3051b5e1143426bbea1374d1fc6d716a143db0e22ce67b61f9e222c68dbe86523abb896d909b32848
-
SSDEEP
12288:uTg9FTJ9NA/0B7JY9J+kO+buLCubYOosihzArBUKClW/BVp44:0g95J9NA/05JY9J+CbmCuMOosi2rBUKL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 884ad82f5e6fa7dafdec3a767bd64ee6_JaffaCakes118
Files
-
884ad82f5e6fa7dafdec3a767bd64ee6_JaffaCakes118.exe windows:5 windows x86 arch:x86
3c5fc9a8168d3d709b296973d921d491
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
GetFileSizeEx
GetFileTime
GetTickCount
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
HeapFree
HeapAlloc
GetDriveTypeA
GetCommandLineA
GetStartupInfoA
Sleep
ExitProcess
ExitThread
CreateThread
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
HeapSize
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapCreate
SetErrorMode
SetHandleCount
GetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
GetFileInformationByHandle
PeekNamedPipe
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetProcessHeap
GetLocaleInfoW
CompareStringW
SetEnvironmentVariableA
GetOEMCP
GetCPInfo
GetModuleHandleW
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetThreadLocale
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
GetCurrentDirectoryA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
InterlockedDecrement
GetModuleFileNameW
GlobalUnlock
LocalFree
MulDiv
FreeResource
GlobalFree
WritePrivateProfileStringA
GetCurrentProcessId
SetLastError
GlobalAddAtomA
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
CompareStringA
InterlockedExchange
GlobalLock
lstrcmpA
GlobalAlloc
CreateProcessA
EnterCriticalSection
LeaveCriticalSection
FormatMessageA
InitializeCriticalSection
GetModuleHandleA
WriteFile
DeleteFileA
GetTempFileNameA
CreateFileA
CreateDirectoryA
lstrlenA
WaitForSingleObject
GetExitCodeProcess
LoadLibraryA
GetProcAddress
FreeLibrary
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
GetModuleFileNameA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
CreateFileW
MultiByteToWideChar
CloseHandle
CreateMutexA
VirtualFree
GetLastError
user32
UnregisterClassA
GetMenuItemInfoA
RegisterClipboardFormatA
PostThreadMessageA
GetClassInfoExA
GetClassInfoA
RegisterClassA
EqualRect
DeferWindowPos
DefWindowProcA
CallWindowProcA
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
UnhookWindowsHookEx
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetWindowContextHelpId
MapDialogRect
GetWindowTextA
SetWindowPos
SetFocus
MoveWindow
SetWindowLongA
GetDlgCtrlID
IsWindow
SetWindowTextA
IsDialogMessageA
MessageBeep
SendDlgItemMessageA
GetDlgItem
GetWindow
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
ShowOwnedPopups
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
PostMessageA
PostQuitMessage
KillTimer
SetTimer
LoadStringA
LoadImageA
GetDC
ReleaseDC
GetSystemMetrics
CreateWindowExA
UpdateWindow
UnpackDDElParam
ReuseDDElParam
LoadIconA
LoadCursorA
SetCursor
ShowWindow
SwitchToThisWindow
EnableWindow
SetForegroundWindow
InvalidateRect
GetClientRect
GetWindowRect
BringWindowToTop
IsIconic
SendMessageA
DrawIcon
GetNextDlgGroupItem
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
CharUpperA
PtInRect
CopyRect
GetSysColorBrush
SetCapture
LoadMenuA
DestroyMenu
ReleaseCapture
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
TranslateAcceleratorA
InflateRect
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
SetActiveWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
SetMenu
AdjustWindowRectEx
gdi32
SetTextColor
SetMapMode
GetClipBox
GetViewportExtEx
GetWindowExtEx
GetPixel
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
CreatePatternBrush
GetStockObject
CreateSolidBrush
CreateFontIndirectA
CreateRectRgnIndirect
GetMapMode
DPtoLP
GetBkColor
GetTextColor
GetRgnBox
GetTextExtentPoint32A
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateBitmap
SetStretchBltMode
StretchBlt
CreateCompatibleBitmap
GetDeviceCaps
GetCurrentObject
GetObjectA
CreateCompatibleDC
SelectObject
SetWindowExtEx
DeleteObject
BitBlt
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegQueryValueA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegQueryInfoKeyA
RegOpenKeyExA
RegQueryValueExA
shell32
SHGetFolderPathA
DragFinish
DragQueryFileA
ShellExecuteA
comctl32
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
oledlg
ord8
ole32
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
OleIsCurrentClipboard
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleFlushClipboard
CoRegisterMessageFilter
CoGetClassObject
oleaut32
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
SysStringLen
SysAllocStringByteLen
OleCreateFontIndirect
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayDestroy
SysAllocString
VariantCopy
SysFreeString
urlmon
URLDownloadToFileA
Sections
.text Size: 419KB - Virtual size: 418KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ