Static task
static1
Behavioral task
behavioral1
Sample
94542345cc2677309dcf34a967835a1d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
94542345cc2677309dcf34a967835a1d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
94542345cc2677309dcf34a967835a1d_JaffaCakes118
-
Size
926KB
-
MD5
94542345cc2677309dcf34a967835a1d
-
SHA1
72f85e91d4e4daca07a60d4e7650c70c6987712d
-
SHA256
d4664e0829e3e5cd527e546ec5e3c10915f752def87513bcf40ddd466c0b4c88
-
SHA512
7b0ed878f0445cfd67877041355cc638d03105bf8775e7c4c5a0ec1b6e240cc5a8b93b1488009d40bc76ce89a521fd5a7ca3390e246bfe0d8162e9ba376b3026
-
SSDEEP
24576:5Kl5t1nOjwMWBcjetT2vGZ7PfSBj3rNIP7npoX55:U3t1uwMWVT2sPa67c5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 94542345cc2677309dcf34a967835a1d_JaffaCakes118
Files
-
94542345cc2677309dcf34a967835a1d_JaffaCakes118.exe windows:4 windows x86 arch:x86
ae1cb14c70506a8bdd66ebf84e83e4a7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
SHGetMalloc
comctl32
ord17
kernel32
WaitForSingleObject
CreateProcessA
lstrcpyA
GetWindowsDirectoryA
SetErrorMode
GetTempPathA
ExpandEnvironmentStringsA
LockResource
SizeofResource
LoadResource
FindResourceA
GetTickCount
GetExitCodeThread
CreateThread
CopyFileA
InterlockedIncrement
InterlockedDecrement
QueryPerformanceFrequency
CreateEventA
lstrcatA
GetTempFileNameA
CompareStringA
CompareStringW
GetVersionExA
LoadLibraryA
FreeLibrary
GetProcAddress
lstrcmpA
lstrcmpiA
GetSystemDefaultLCID
GlobalHandle
VerLanguageNameA
MoveFileA
SetCurrentDirectoryA
FindClose
FindNextFileA
CompareFileTime
FindFirstFileA
GetSystemTimeAsFileTime
SetFileAttributesA
LocalFree
FormatMessageA
GetSystemInfo
MulDiv
IsValidCodePage
GetVersion
GetModuleHandleA
GetFileAttributesA
IsBadReadPtr
VirtualQuery
FlushFileBuffers
GetDiskFreeSpaceA
GetDriveTypeA
CreateDirectoryA
GetLastError
GetCurrentThread
GetLocaleInfoA
GetDateFormatA
GetTimeFormatA
ExitProcess
SearchPathA
SetStdHandle
GetStringTypeW
GetStringTypeA
IsBadCodePtr
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
SetLastError
HeapSize
HeapReAlloc
GetCommandLineA
GetStartupInfoA
TerminateProcess
RaiseException
RtlUnwind
LeaveCriticalSection
DeleteCriticalSection
InterlockedExchange
InitializeCriticalSection
EnterCriticalSection
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
lstrlenA
CreateFileA
GetFileSize
GlobalAlloc
CloseHandle
GlobalLock
ReadFile
GlobalUnlock
GlobalFree
GetCurrentProcess
DuplicateHandle
GetThreadContext
VirtualProtectEx
WriteProcessMemory
FlushInstructionCache
SetThreadContext
ResumeThread
DeleteFileA
Sleep
RemoveDirectoryA
IsDBCSLeadByte
SetFilePointer
GetProcessHeap
HeapAlloc
HeapFree
WriteFile
lstrcpynA
GetModuleFileNameA
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
VirtualProtect
ResetEvent
SetEvent
QueryPerformanceCounter
SystemTimeToFileTime
GetExitCodeProcess
LocalAlloc
user32
UpdateWindow
SetCursor
GetWindow
GetDlgItemTextA
SetFocus
GetClassInfoA
wvsprintfA
LoadStringA
EnableWindow
GetParent
GetWindowTextLengthA
GetWindowTextA
MoveWindow
SetWindowTextA
GetWindowPlacement
DrawIcon
DestroyIcon
GetDlgCtrlID
FillRect
GetSysColor
IsDialogMessageA
SendMessageA
GetWindowRect
GetSystemMetrics
SetRect
FindWindowA
IntersectRect
SubtractRect
IsWindow
CharPrevA
CharNextA
WaitForInputIdle
GetWindowLongA
BeginPaint
EndPaint
SetWindowLongA
GetClientRect
ClientToScreen
SetWindowPos
GetWindowDC
EndDialog
GetDlgItem
ShowWindow
GetDesktopWindow
wsprintfA
MsgWaitForMultipleObjects
PeekMessageA
MessageBoxA
CreateDialogIndirectParamA
CreateDialogParamA
DialogBoxIndirectParamA
DialogBoxParamA
DefWindowProcA
PostMessageA
KillTimer
PostQuitMessage
SetTimer
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
GetDC
ReleaseDC
CharUpperA
ExitWindowsEx
SendDlgItemMessageA
DestroyWindow
GetSysColorBrush
gdi32
CreateFontA
GetTextExtentPoint32A
SetBkMode
SetTextColor
GetObjectA
CreateFontIndirectA
CreateSolidBrush
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
DeleteObject
GetStockObject
GetSystemPaletteEntries
CreatePalette
GetDeviceCaps
SelectPalette
RealizePalette
CreateDIBitmap
TranslateCharsetInfo
advapi32
RegOpenKeyA
OpenThreadToken
RegEnumValueA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
SetSecurityDescriptorDacl
ole32
CLSIDFromProgID
CoInitializeSecurity
CoUninitialize
CoInitialize
oleaut32
SysAllocStringLen
SysReAllocStringLen
SysStringLen
SysAllocString
VariantClear
VariantChangeType
GetErrorInfo
SysFreeString
rpcrt4
UuidCreate
UuidToStringA
RpcStringFreeA
Sections
.text Size: 284KB - Virtual size: 282KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ