Static task
static1
Behavioral task
behavioral1
Sample
8d8099c1edccab0d000b3fb63d99f296_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8d8099c1edccab0d000b3fb63d99f296_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8d8099c1edccab0d000b3fb63d99f296_JaffaCakes118
-
Size
428KB
-
MD5
8d8099c1edccab0d000b3fb63d99f296
-
SHA1
42249de7355e5732df3a72a3a3946625ce43feb4
-
SHA256
7458787b4d3aca218ef768f5167840103b5151027eefe0febe2f749570abc677
-
SHA512
01c7fbd02f4004a21c8db818ecd0a750f38ea6dc5a74e711283210705f7a56fd77ff0150eb5bbe4b10e25d6ab44a377fef7398a0acb42cf1ff8062a40a5154ec
-
SSDEEP
12288:pYuppbagVy70lvmlegnWvqG2Iu9TrMrFzbHOXmE:plp8s00lvmwcWy+STrm5sR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8d8099c1edccab0d000b3fb63d99f296_JaffaCakes118
Files
-
8d8099c1edccab0d000b3fb63d99f296_JaffaCakes118.exe windows:5 windows x86 arch:x86
b682f159c97effb8b8ab136cc64fea98
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
wininet
InternetOpenA
InternetConnectA
InternetGetLastResponseInfoA
HttpOpenRequestA
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetReadFile
InternetCloseHandle
InternetGetConnectedState
InternetGetCookieA
HttpQueryInfoA
HttpSendRequestA
InternetQueryDataAvailable
shlwapi
PathIsDirectoryA
PathRemoveFileSpecA
PathRemoveExtensionA
PathFindExtensionA
PathFileExistsA
PathAppendA
SHGetValueA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
advapi32
RegEnumValueA
RegQueryValueA
RegEnumKeyA
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegCloseKey
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegOpenKeyA
SetNamedSecurityInfoA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
kernel32
FindResourceA
FreeResource
SetFilePointer
CreateActCtxW
ReleaseActCtx
GetModuleFileNameW
InterlockedDecrement
lstrcmpW
CompareStringA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
MulDiv
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
CreateSemaphoreA
ReleaseSemaphore
CreateEventA
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetFullPathNameA
SetThreadPriority
ResumeThread
SuspendThread
GetFileAttributesExA
GetFileSizeEx
GetModuleHandleW
InterlockedExchange
LoadLibraryExA
GetLocaleInfoA
GetSystemDefaultUILanguage
ConvertDefaultLocale
GetUserDefaultUILanguage
GetCurrentThread
GetPrivateProfileIntA
WritePrivateProfileStringA
GetPrivateProfileStringA
LocalAlloc
InterlockedIncrement
TlsGetValue
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
EncodePointer
DecodePointer
HeapFree
GetSystemTimeAsFileTime
HeapAlloc
HeapReAlloc
GetFileType
HeapSetInformation
GetStartupInfoW
RtlUnwind
RaiseException
ExitThread
CreateThread
HeapQueryInformation
HeapSize
SetStdHandle
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
HeapCreate
GetStringTypeW
CompareStringW
GetConsoleCP
GetConsoleMode
GetStdHandle
SetHandleCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
WriteConsoleW
GetProcessHeap
CreateFileW
SetEnvironmentVariableA
FindClose
FindFirstFileA
GetFileAttributesA
TerminateProcess
OpenProcess
LocalFree
FormatMessageA
CloseHandle
ReadFile
lstrlenA
lstrcmpiA
GetCommandLineA
CreateProcessA
GetVolumeInformationA
ExitProcess
CreateMutexA
Sleep
GetModuleHandleA
WriteFile
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameA
SetUnhandledExceptionFilter
GetFileTime
CreateFileA
GetShortPathNameA
GetTempPathA
CopyFileA
lstrcmpA
WaitForSingleObject
DeleteFileA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
FileTimeToLocalFileTime
FileTimeToSystemTime
GetTimeZoneInformation
LoadLibraryA
FreeLibrary
lstrcpyA
GetProcAddress
GetVersionExA
LoadLibraryW
GetSystemDirectoryW
GetACP
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
ActivateActCtx
GetLastError
DeactivateActCtx
SetLastError
SetEvent
user32
IsDialogMessageA
ShowWindow
UnregisterClassA
DestroyMenu
RealChildWindowFromPoint
InvalidateRect
ValidateRect
CharUpperA
IsWindowEnabled
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMenuState
LoadIconW
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
SetFocus
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageA
MonitorFromWindow
GetKeyState
SetMenu
UpdateWindow
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxA
CreateWindowExA
GetClassInfoExA
RegisterClassA
AdjustWindowRectEx
GetWindowRect
ScreenToClient
PtInRect
GetDlgCtrlID
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
UnhookWindowsHookEx
SetForegroundWindow
IsWindowVisible
FindWindowExA
PostMessageA
GetWindowThreadProcessId
SetWindowTextA
GetForegroundWindow
EnableWindow
SetTimer
KillTimer
GetWindowTextA
SetCursor
GetCursorPos
RegisterWindowMessageA
LoadCursorA
SendMessageA
MapWindowPoints
GetParent
GetSysColorBrush
GetSysColor
SystemParametersInfoA
EnumDisplayMonitors
SetRectEmpty
CopyRect
GetMonitorInfoA
GetSystemMetrics
GetClientRect
GetClassNameA
GetWindow
DefWindowProcA
GetClassInfoA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
PostQuitMessage
GetMessageA
TranslateMessage
GetActiveWindow
GetMenu
gdi32
SaveDC
RestoreDC
SetBkColor
SetTextColor
CreateDIBitmap
GetTextMetricsA
CreatePatternBrush
CreatePen
CreateSolidBrush
GetObjectA
GetStockObject
CreateFontIndirectA
EnumFontFamiliesA
GetTextCharsetInfo
DeleteObject
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
CreateBitmap
GetClipBox
SetMapMode
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
shell32
SHGetSpecialFolderPathA
ole32
StringFromIID
CoGetMalloc
CoUninitialize
CoTaskMemFree
CoCreateGuid
oleaut32
SysFreeString
SysAllocStringLen
VariantClear
VariantInit
VariantChangeType
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 259KB - Virtual size: 259KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ