Static task
static1
Behavioral task
behavioral1
Sample
8b754e3d9b16b6b33132c7463051caab_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8b754e3d9b16b6b33132c7463051caab_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8b754e3d9b16b6b33132c7463051caab_JaffaCakes118
-
Size
188KB
-
MD5
8b754e3d9b16b6b33132c7463051caab
-
SHA1
1538f8b37635163215f0c24bbaff61f0e3249f6c
-
SHA256
f2b0ffcdbaaa715ef5a459e34d86bb7636346c791c2a68d55809e6b1f80bc623
-
SHA512
febcdcf0430fb1c04bf5a3ee5f2352c154760f7b7af14bffe66e0b48ecee295736826d1b44bebef2d868413e075b66ca5f459d72d9e417d37af2b0965325343f
-
SSDEEP
3072:jN8xQ6wdlIkzYjes3nLrhJi44dOcgxLEZ+/7zXw9he0UUgt+03:JmQWkcS4nLrhJi4/VEZ+HXw9dBX03
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b754e3d9b16b6b33132c7463051caab_JaffaCakes118
Files
-
8b754e3d9b16b6b33132c7463051caab_JaffaCakes118.exe windows:4 windows x86 arch:x86
bc6b86fc011c693464a7c0c58e61d67a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathA
ShellExecuteA
wininet
InternetOpenUrlA
InternetConnectA
InternetReadFile
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetCloseHandle
HttpQueryInfoA
shlwapi
PathAppendA
StrStrA
PathRemoveFileSpecA
PathFileExistsA
PathFindExtensionA
SHGetValueA
PathFindFileNameA
kernel32
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
InitializeCriticalSection
RtlUnwind
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
GetEnvironmentStringsW
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
GetThreadLocale
GlobalGetAtomNameA
LocalAlloc
GlobalReAlloc
GlobalHandle
LocalReAlloc
lstrcmpA
GlobalFlags
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
RaiseException
HeapSize
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
GetStdHandle
ExitProcess
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
VirtualFree
HeapCreate
HeapDestroy
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
GetStartupInfoA
GetProcessHeap
GetVersionExA
GetCommandLineA
GetSystemTimeAsFileTime
HeapReAlloc
GetModuleHandleA
VirtualAlloc
HeapAlloc
HeapFree
DeleteFileA
GetTempPathA
CreateMutexA
LockResource
OpenMutexA
CopyFileA
SetLastError
ReadFile
SizeofResource
Sleep
WriteFile
GetCurrentThread
LoadResource
FindResourceA
GetFileSize
CreateFileA
GetVersion
CompareStringA
GetLastError
InterlockedExchange
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
CloseHandle
LoadLibraryA
GetProcAddress
TerminateProcess
WaitForSingleObject
FreeLibrary
LocalFree
user32
DestroyMenu
PostQuitMessage
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowPos
SetWindowLongA
IsWindow
GetDlgItem
GetFocus
ClientToScreen
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
UnregisterClassA
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
PeekMessageA
ValidateRect
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
LoadIconA
WinHelpA
GetCapture
GetWindowThreadProcessId
PostMessageA
EnumWindows
FindWindowExA
GetWindow
FindWindowA
GetWindowTextA
MessageBoxA
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
RegisterWindowMessageA
gdi32
SetMapMode
GetClipBox
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
SelectObject
CreateBitmap
GetStockObject
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
OffsetViewportOrgEx
GetDeviceCaps
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SetViewportOrgEx
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegCloseKey
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 124KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ