Static task
static1
Behavioral task
behavioral1
Sample
a069e5f17264dc2312b58d54a9ff5743_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a069e5f17264dc2312b58d54a9ff5743_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a069e5f17264dc2312b58d54a9ff5743_JaffaCakes118
-
Size
1.3MB
-
MD5
a069e5f17264dc2312b58d54a9ff5743
-
SHA1
9baa41b6360f1d6d730e0b5cc84a0766a6a49da3
-
SHA256
b41b2a94dd631b664f62f5ceddc5ebf7d9a1ede1c8a5604db384fb5a517d88db
-
SHA512
891ecfeefa0af0a573c0372ecab172f6707b3420229946f5f3925cec14f2ab702ccb56caa333e9a15a0f6042bbf2d1dc91b42062cbf1596cfd3985570fa4d5ce
-
SSDEEP
24576:qnttL7pNDJgviwwBXXgfWKczyhTSmuYd9T9Um:spNDZXmWKk0TSmuYHTh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a069e5f17264dc2312b58d54a9ff5743_JaffaCakes118
Files
-
a069e5f17264dc2312b58d54a9ff5743_JaffaCakes118.exe windows:4 windows x86 arch:x86
79d2908157eed676548e8c26ec761fab
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFlags
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetFileAttributesW
GetFileTime
FindNextFileW
SetErrorMode
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
RaiseException
ExitThread
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
VirtualProtect
VirtualAlloc
VirtualQuery
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetEnvironmentVariableA
GetFullPathNameW
GetVolumeInformationW
FindFirstFileW
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetThreadLocale
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentProcessId
SuspendThread
WritePrivateProfileStringW
GetCurrentThread
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
CompareStringA
InterlockedDecrement
FormatMessageW
LocalFree
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
FreeLibrary
CompareStringW
LoadLibraryA
GetVersionExA
MulDiv
GetModuleHandleA
GlobalFree
SetEvent
GetTickCount
ResumeThread
SetThreadPriority
CreateEventW
ReadFile
SetFilePointer
GetFileSize
GetModuleFileNameW
IsBadStringPtrA
CreateThread
TerminateThread
Sleep
FindClose
InterlockedExchange
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
OpenProcess
lstrcmpW
FreeResource
GetLocalTime
lstrcatW
lstrcpyW
CreateFileW
DeleteFileW
GlobalUnlock
GlobalLock
GlobalAlloc
FindResourceW
ExitProcess
CopyFileA
lstrcpyA
CreateDirectoryA
CloseHandle
WriteFile
CreateFileA
lstrcmpA
lstrcatA
GetModuleFileNameA
WaitForSingleObject
CreateMutexW
LockResource
LoadResource
SizeofResource
FindResourceA
GetVolumeInformationA
GetDriveTypeA
MultiByteToWideChar
lstrlenA
FindNextFileA
FindFirstFileA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetLogicalDrives
GetProcAddress
GetModuleHandleW
LoadLibraryW
GetLastError
SetLastError
WideCharToMultiByte
GetSystemInfo
lstrlenW
user32
SetTimer
KillTimer
DestroyIcon
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableW
CharNextW
ReleaseCapture
SetCapture
UnregisterClassW
GetSysColorBrush
CharUpperW
GetWindowThreadProcessId
GetMessageW
TranslateMessage
GetCursorPos
ValidateRect
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
SystemParametersInfoW
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetLastActivePopup
DispatchMessageW
SetParent
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
TrackPopupMenu
GetKeyState
IsWindowVisible
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
EqualRect
PtInRect
GetClientRect
UnregisterClassA
DrawAnimatedRects
FindWindowW
EnumChildWindows
DefWindowProcW
CallWindowProcW
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
SetWindowPos
ShowWindow
MoveWindow
SetWindowLongW
GetDlgCtrlID
SetWindowTextW
IsDialogMessageW
SendDlgItemMessageW
GetWindowTextLengthW
GetWindowTextW
GetWindow
EndPaint
BeginPaint
RegisterClipboardFormatW
LoadMenuW
SetMenuDefaultItem
LoadImageW
RedrawWindow
EnableWindow
SendMessageW
LoadIconW
CreatePopupMenu
AppendMenuW
GetWindowRect
RegisterWindowMessageW
SetFocus
IsIconic
GetSystemMetrics
DrawIcon
GetDesktopWindow
IsWindowEnabled
GetActiveWindow
SetActiveWindow
wsprintfW
GetSysColor
UpdateWindow
PostThreadMessageW
SetForegroundWindow
GetParent
InvalidateRect
LoadCursorW
SetCursor
CopyRect
GetFocus
IsWindow
PostMessageW
EndDialog
GetNextDlgTabItem
GetDlgItem
GetWindowLongW
DestroyWindow
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
ScreenToClient
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
CreateDialogIndirectParamW
gdi32
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetDeviceCaps
CreateBitmap
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetObjectW
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
GetStockObject
CreateFontW
CreateFontIndirectW
GetCurrentObject
BitBlt
SelectObject
CreateCompatibleDC
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
OpenPrinterW
DocumentPropertiesW
advapi32
RegSetValueExA
RegEnumValueA
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyW
RegOpenKeyA
RegCreateKeyW
RegDeleteValueW
RegQueryValueExW
RegSetValueExW
RegQueryValueExA
RegOpenKeyExW
RegCloseKey
shell32
ShellExecuteW
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
SHAppBarMessage
Shell_NotifyIconW
ShellExecuteA
comctl32
InitCommonControlsEx
_TrackMouseEvent
shlwapi
PathIsUNCW
PathStripToRootW
UrlUnescapeW
PathFindFileNameW
PathFindExtensionW
oledlg
OleUIBusyW
ole32
CoTaskMemAlloc
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoCreateInstance
CLSIDFromProgID
CoTaskMemFree
CoInitialize
CreateStreamOnHGlobal
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
SysFreeString
SysStringLen
OleCreateFontIndirect
SafeArrayDestroy
SysAllocString
VariantCopy
gdiplus
GdiplusStartup
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromStream
GdiplusShutdown
GdipCloneImage
GdipDisposeImage
GdipAlloc
GdipFree
psapi
EnumProcessModules
EnumProcesses
GetModuleFileNameExW
wininet
InternetOpenUrlW
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetOpenW
InternetGetLastResponseInfoW
InternetCloseHandle
HttpQueryInfoW
InternetQueryDataAvailable
InternetQueryOptionW
InternetCanonicalizeUrlW
InternetCrackUrlW
InternetGetConnectedState
Sections
.text Size: 310KB - Virtual size: 310KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 197KB - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 736KB - Virtual size: 736KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ