Static task
static1
Behavioral task
behavioral1
Sample
a1aac737ac298292c2c43e83c621f057_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a1aac737ac298292c2c43e83c621f057_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a1aac737ac298292c2c43e83c621f057_JaffaCakes118
-
Size
2.3MB
-
MD5
a1aac737ac298292c2c43e83c621f057
-
SHA1
cc47c7e35b758e235f0529b59d492408d9d24ff6
-
SHA256
53a527c08365078d442263eff961651e09c67dd62f053d6f33a1de363139d094
-
SHA512
ede3d467960a4e226c98b04c631aa8e436ad5ce3822d87ea1e12c15d627867a58f03fc8bd139af7cb7735bd465e75e60806d09ad7e126f3d5d28fc37a7a8297e
-
SSDEEP
49152:NlIDekh7RlIlZDx/BIn/7vhtlIGCwILp7ssC7Wus6cIBvmvZwIpgFnwCgEzI2Q0W:wh7ODYvhbr9QB+XoyK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a1aac737ac298292c2c43e83c621f057_JaffaCakes118
Files
-
a1aac737ac298292c2c43e83c621f057_JaffaCakes118.exe windows:4 windows x86 arch:x86
74422304f2f462d485afa096a2dc18f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
sqlite3
sqlite3_sourceid
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_except_handler3
kernel32
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
WritePrivateProfileStringA
WriteFile
WideCharToMultiByte
WaitForSingleObjectEx
WaitForSingleObject
WaitForMultipleObjectsEx
VirtualFree
VirtualAlloc
UnmapViewOfFile
GetCommandLineA
LoadLibraryA
ExitProcess
GetTickCount
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetVersion
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetProcAddress
GetModuleHandleA
CreateDirectoryW
CreateEventA
CreateFileA
CreateFileMappingA
CreateFileMappingW
CreateFileW
CreateMutexA
CreateMutexW
CreatePipe
CreateProcessA
CreateProcessW
CreateThread
DebugBreak
DeleteCriticalSection
DeleteFileA
DeleteFileW
DeviceIoControl
DosDateTimeToFileTime
ExpandEnvironmentStringsA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FindResourceA
FindResourceExW
FindResourceW
FlushConsoleInputBuffer
FlushFileBuffers
FormatMessageA
FormatMessageW
FreeResource
GetDiskFreeSpaceA
GetDiskFreeSpaceExA
GetDriveTypeA
GetEnvironmentVariableA
GetExitCodeProcess
GetFileAttributesA
GetFileAttributesW
GetFileType
GetLastError
GetLocaleInfoW
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetOverlappedResult
GetPrivateProfileIntA
GetPrivateProfileIntW
GetPrivateProfileStringA
GetPrivateProfileStringW
GetProcessHeap
GetStartupInfoA
GetStartupInfoW
GetStdHandle
GetStringTypeExA
GetStringTypeExW
GetSystemDirectoryA
GetSystemInfo
GetSystemTime
GetTempFileNameA
GetTempPathA
GetTimeZoneInformation
GetUserDefaultLangID
GetUserDefaultLCID
GetVersionExA
GetVersionExW
GetVolumeInformationA
GetVolumeInformationW
GetWindowsDirectoryA
GetWindowsDirectoryW
GlobalAlloc
GlobalFree
GlobalLock
GlobalMemoryStatus
GlobalSize
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
IsBadWritePtr
LCMapStringA
LCMapStringW
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LockResource
lstrcatA
lstrcmpA
lstrcpyA
lstrcpyW
lstrlenA
lstrlenW
MapViewOfFile
MoveFileA
MulDiv
MultiByteToWideChar
OpenEventA
OpenEventW
OpenFileMappingA
OpenFileMappingW
OpenMutexA
OpenProcess
OutputDebugStringA
OutputDebugStringW
PeekNamedPipe
QueryDosDeviceA
RaiseException
ReadFile
ReleaseMutex
ReleaseSemaphore
UnhandledExceptionFilter
ResetEvent
ResumeThread
SetEvent
SetFileAttributesA
SetFileAttributesW
SetFilePointer
SetFileTime
SetLastError
SetThreadExecutionState
SetUnhandledExceptionFilter
SizeofResource
SleepEx
SystemTimeToFileTime
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
RemoveDirectoryA
user32
CreateWindowExA
CreateWindowExW
DefWindowProcA
DestroyCursor
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageA
DrawFocusRect
DrawFrameControl
DrawIconEx
DrawStateA
DrawTextA
DrawTextW
EnableWindow
EnumChildWindows
EnumWindows
EqualRect
FillRect
FindWindowA
FindWindowExA
FindWindowW
FlashWindow
FrameRect
GetAsyncKeyState
GetCapture
GetClassInfoA
GetClientRect
GetCursor
GetCursorPos
GetDC
GetDesktopWindow
GetDlgItem
GetFocus
GetIconInfo
GetMessageA
GetParent
GetProcessWindowStation
GetSysColor
GetSystemMetrics
GetUserObjectInformationW
GetWindowDC
GetWindowLongA
GetWindowRect
GetWindowTextA
GetWindowTextLengthW
GetWindowTextW
GetWindowThreadProcessId
InflateRect
InsertMenuItemW
IntersectRect
InvalidateRect
IsIconic
IsRectEmpty
IsWindowVisible
IsZoomed
KillTimer
LoadBitmapA
LoadCursorA
LoadIconA
LoadImageA
LoadImageW
LoadStringA
LoadStringW
MapWindowPoints
MessageBeep
MoveWindow
OffsetRect
PeekMessageA
PostMessageA
PostMessageW
PostThreadMessageA
PtInRect
RedrawWindow
RegisterClassA
RegisterClassExA
RegisterHotKey
ReleaseCapture
ReleaseDC
ScreenToClient
SendMessageA
SendMessageW
SetActiveWindow
SetCapture
SetCursor
SetFocus
SetForegroundWindow
SetParent
SetRectEmpty
SetTimer
SetWindowLongA
SetWindowPos
SetWindowRgn
SetWindowTextA
SetWindowTextW
ShowScrollBar
ShowWindow
SystemParametersInfoA
TrackPopupMenuEx
TranslateMessage
UnregisterClassA
UpdateWindow
WindowFromPoint
wsprintfA
wsprintfW
CreatePopupMenu
CopyRect
MessageBoxW
MessageBoxA
GetKeyboardType
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
ole32
OleInitialize
CoInitialize
shlwapi
PathFileExistsA
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 14.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lzmat Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ