Static task
static1
Behavioral task
behavioral1
Sample
973c8cfbf6f02eb66c72a0613c039837_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
973c8cfbf6f02eb66c72a0613c039837_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
973c8cfbf6f02eb66c72a0613c039837_JaffaCakes118
-
Size
488KB
-
MD5
973c8cfbf6f02eb66c72a0613c039837
-
SHA1
bd5440801d40425365549a623576a335436f5dd9
-
SHA256
02e9ae672ebe98e357f6024560122094a3be0015985986b149c75527fe134fad
-
SHA512
01c22cca6d238756258db199ce97c7ce5d04aadf7e6a160ad173b3ad5c79aa907812191bf697a377eb72b391ff6e5fc433fc8b3084484386a7091d2fcd3a61a8
-
SSDEEP
6144:xN5GvYATSPcojfAvmCkfOmYNb6TgUyPf+WZ/0B0N4ryYndpY9cVa+qd5R8cTBMrK:r50TAfOmYtzZ/Wxrh7QX5acTyrmb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 973c8cfbf6f02eb66c72a0613c039837_JaffaCakes118
Files
-
973c8cfbf6f02eb66c72a0613c039837_JaffaCakes118.exe windows:4 windows x86 arch:x86
ce7d6edf87d8171486d5a43ca1c0193e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
shlwapi
PathIsUNCA
PathFindFileNameA
PathFileExistsA
PathStripToRootA
PathFindExtensionA
SHGetValueA
advapi32
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegOpenKeyA
SetSecurityDescriptorDacl
RegDeleteKeyA
kernel32
GetVersionExA
lstrcmpW
GlobalFindAtomA
GetModuleFileNameW
InterlockedDecrement
InterlockedIncrement
FileTimeToSystemTime
FileTimeToLocalFileTime
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
WritePrivateProfileStringA
GlobalFlags
SetErrorMode
GetFileAttributesA
GetFileTime
GetCPInfo
GetOEMCP
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
ExitProcess
GetCommandLineA
GetProcessHeap
GetStartupInfoA
WriteConsoleW
GetFileType
GetStdHandle
RtlUnwind
ExitThread
CreateThread
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
GetConsoleCP
GetConsoleMode
Sleep
GetACP
LCMapStringA
LCMapStringW
GetTimeZoneInformation
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
DebugBreak
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
GetStringTypeA
GetStringTypeW
SetEnvironmentVariableA
ReleaseSemaphore
CreateSemaphoreA
GlobalGetAtomNameA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetCurrentProcessId
GlobalAddAtomA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalDeleteAtom
GetModuleHandleA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
MulDiv
CreateEventA
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
RaiseException
LocalAlloc
SetFilePointer
WriteFile
ReadFile
CreateFileA
FreeResource
LocalFree
GetModuleFileNameA
GetCurrentProcess
CreateMutexA
FreeLibrary
GetCurrentThreadId
SetLastError
GetVersion
CompareStringA
lstrcmpiA
InterlockedExchange
MultiByteToWideChar
CompareStringW
lstrlenA
SetFileTime
CloseHandle
SystemTimeToFileTime
CompareFileTime
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GetProcAddress
LoadLibraryA
GetTempPathA
GetLastError
VirtualProtect
user32
BeginPaint
EndPaint
DestroyMenu
UnregisterClassA
ReleaseDC
GetSysColorBrush
ShowWindow
IsDialogMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
GrayStringA
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
GetLastActivePopup
MessageBoxA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
PostQuitMessage
PostMessageA
GetMenuState
DrawTextExA
DrawTextA
TabbedTextOutA
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
SendMessageA
GetKeyState
PeekMessageA
ValidateRect
wsprintfA
GetParent
GetClassNameA
GetSystemMetrics
SendMessageTimeoutA
RegisterWindowMessageA
EnumChildWindows
EnumThreadWindows
WaitForInputIdle
BringWindowToTop
GetWindowThreadProcessId
SetWindowTextA
GetClientRect
EnableWindow
SetTimer
EnumWindows
GetWindowTextA
GetCursorPos
CharUpperA
ClientToScreen
LoadCursorA
GetDC
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
SelectObject
GetStockObject
ExtTextOutA
GetClipBox
CreateBitmap
GetDeviceCaps
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
DeleteObject
GetObjectA
SetBkColor
SetTextColor
Escape
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
ole32
OleRun
CoUninitialize
CoInitialize
CoGetMalloc
CoCreateInstance
CoDisconnectObject
oleaut32
LoadTypeLi
SysAllocString
VariantClear
SysAllocStringLen
VariantInit
VariantCopy
GetErrorInfo
VariantChangeType
SysFreeString
SysStringLen
SysAllocStringByteLen
Sections
.text Size: 380KB - Virtual size: 378KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ