Static task
static1
Behavioral task
behavioral1
Sample
972a0334c22cc119793c262079cf5e0e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
972a0334c22cc119793c262079cf5e0e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
972a0334c22cc119793c262079cf5e0e_JaffaCakes118
-
Size
308KB
-
MD5
972a0334c22cc119793c262079cf5e0e
-
SHA1
f81651347ac83123eb9fac41b56d85b4c0796e4b
-
SHA256
d5453fe94a07115f3f340e5029d81f46f9af706bf2d079c829fa86e6bd972233
-
SHA512
e0fe5b0aed5efd64373b842e6fa97696dadbec5cd6da38aa805cd20f0e332c536bb71bd011323610da029b80244051ece54c2e0ef61c0d1c7b5e0eb42e1ba6dd
-
SSDEEP
6144:omXuVz/XdzUvtKVmAHzYkuFBsI69IQ++RMincWkm/C:uXdzFTYzFuIeuin/6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 972a0334c22cc119793c262079cf5e0e_JaffaCakes118
Files
-
972a0334c22cc119793c262079cf5e0e_JaffaCakes118.exe windows:5 windows x86 arch:x86
f4ff562edf2c97857f80306875e0a51d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
UuidCreateSequential
kernel32
DeleteFileA
lstrlenA
LocalFree
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
FindClose
FindFirstFileA
GetVolumeInformationA
GetFullPathNameA
CreateFileA
MoveFileA
FileTimeToLocalFileTime
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedDecrement
CompareStringA
GetModuleHandleW
InterlockedIncrement
GetFileAttributesA
GetFileSizeEx
GetFileTime
GlobalGetAtomNameA
lstrcmpA
GetCurrentThreadId
GlobalAddAtomA
GlobalFlags
GetVersionExA
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GetLocaleInfoA
GetCPInfo
GetOEMCP
HeapAlloc
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
GetTimeZoneInformation
GetLocalTime
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
VirtualAlloc
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
VirtualFree
HeapCreate
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetACP
IsValidCodePage
CompareStringW
SetEnvironmentVariableA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetProcessHeap
GetCompressedFileSizeA
Sleep
GetComputerNameA
GetModuleHandleA
GetModuleFileNameA
CloseHandle
WaitForSingleObject
CreateEventA
SetLastError
FindResourceA
SizeofResource
LockResource
LoadResource
GetLastError
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
GetSystemDirectoryA
GetProcAddress
LoadLibraryA
FileTimeToSystemTime
user32
GetDlgItem
IsWindow
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetCapture
WinHelpA
LoadIconA
RegisterWindowMessageA
CheckMenuItem
EnableMenuItem
ModifyMenuA
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
DestroyMenu
GetClientRect
PostMessageA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
GetTopWindow
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
SetWindowTextA
GetKeyState
PeekMessageA
ValidateRect
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowThreadProcessId
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
CharUpperA
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetKeyboardLayoutNameA
SendMessageA
LoadStringA
GetClassNameA
GetForegroundWindow
GetWindowTextA
EnumChildWindows
CallNextHookEx
PostQuitMessage
DefWindowProcA
RegisterClassExA
SetWindowsHookExA
CreateWindowExA
SetTimer
GetMessageA
DispatchMessageA
UnhookWindowsHookEx
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
PtInRect
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
shlwapi
PathFindFileNameA
PathIsUNCA
PathStripToRootA
PathRemoveFileSpecA
oleacc
CreateStdAccessibleObject
LresultFromObject
wininet
InternetQueryDataAvailable
HttpOpenRequestA
InternetConnectA
HttpSendRequestExA
HttpEndRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
HttpAddRequestHeadersA
InternetCloseHandle
InternetOpenA
InternetGetLastResponseInfoA
gdi32
GetStockObject
SetViewportExtEx
DeleteObject
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
GetClipBox
CreateBitmap
DeleteDC
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
GetDeviceCaps
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comdlg32
GetFileTitleA
oleaut32
VariantInit
VariantClear
VariantChangeType
Sections
.text Size: 154KB - Virtual size: 153KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 110KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE