Static task
static1
Behavioral task
behavioral1
Sample
a755e92748cbcdf8560bfd6675fd6da5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a755e92748cbcdf8560bfd6675fd6da5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a755e92748cbcdf8560bfd6675fd6da5_JaffaCakes118
-
Size
640KB
-
MD5
a755e92748cbcdf8560bfd6675fd6da5
-
SHA1
31eeee6aa67668525ec214d4c273d9be31bc4eec
-
SHA256
07fd35f9329ede8c83d3b9cdbb5e3c657daea8fff091dad17b9273d3f3668f45
-
SHA512
6fc9ff15ab5a6a9f2ce8ddc4aa6310e075553704bef456a13b2539c506db2737896db7996149cef08d9d642297efada27803b3a16fb453f8981314e1a7957b43
-
SSDEEP
12288:i+QMlf809DBFHj3lr04rfs1sDpu4x8JC96:i+QMpnj3lrB5u4x8R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a755e92748cbcdf8560bfd6675fd6da5_JaffaCakes118
Files
-
a755e92748cbcdf8560bfd6675fd6da5_JaffaCakes118.exe windows:4 windows x86 arch:x86
a85f309238d29b6bdbac24ebc0d9b0db
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
FlushIpNetTable
SendARP
GetAdaptersInfo
ws2_32
inet_addr
ntohl
htonl
htons
ntohs
winfw
WinFw_Open
WinFw_EnumAdapterList
WinFw_StopCapture
WinFw_SendPacket
WinFw_Close
WinFw_StartCapture
WinFw_SetFlag
esadr
EsModuleInit
EsAdrPtr
winmm
timeSetEvent
timeKillEvent
shlwapi
PathFindFileNameA
kernel32
GetTimeZoneInformation
GetLocalTime
RtlUnwind
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
HeapReAlloc
RaiseException
ExitThread
GetACP
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetErrorMode
GetFileTime
GetFileSize
GetFileAttributesA
GetOEMCP
GetCPInfo
GetCurrentDirectoryA
GlobalFlags
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
GetThreadLocale
GetFullPathNameA
GetVolumeInformationA
DeleteFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
DuplicateHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindFirstFileA
FindClose
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalFree
FormatMessageA
LocalFree
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GlobalDeleteAtom
GetCurrentThread
SuspendThread
SetThreadPriority
ResumeThread
GetWindowsDirectoryA
MulDiv
GetCurrentProcess
FlushInstructionCache
VirtualProtect
SetLastError
GetSystemTime
CreateThread
WaitForSingleObject
SetEvent
CloseHandle
CreateEventA
GlobalAlloc
GlobalLock
GlobalUnlock
HeapFree
GetProcessHeap
HeapAlloc
GetTempPathA
GetTempFileNameA
lstrlenA
GetVersionExA
GetLastError
lstrcpyA
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetModuleHandleA
LeaveCriticalSection
lstrcmpA
lstrcpynA
GetCurrentThreadId
lstrcmpiA
GetVersion
GetTickCount
WritePrivateProfileStringA
WinExec
LoadLibraryA
TerminateThread
FreeLibrary
GetPrivateProfileStringA
GetProcAddress
GetPrivateProfileIntA
GetModuleFileNameA
Sleep
InterlockedExchange
GetProfileStringA
HeapSize
user32
WinHelpA
IsChild
GetTopWindow
AdjustWindowRectEx
SendDlgItemMessageA
IsDialogMessageA
SetWindowTextA
CharNextA
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
PostThreadMessageA
CreateDialogIndirectParamA
GetDlgItem
GrayStringA
TabbedTextOutA
GetMenuCheckMarkDimensions
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetNextDlgTabItem
GetLastActivePopup
PostQuitMessage
TranslateMessage
PeekMessageA
CreateIconIndirect
DrawTextExA
GetCapture
SetFocus
GetMessagePos
WindowFromDC
FrameRect
HideCaret
CopyRect
GetSysColorBrush
CopyIcon
SetRect
SetCursor
LoadStringA
DestroyCursor
CharUpperA
CharLowerA
GetWindowPlacement
DrawMenuBar
IsMenu
EqualRect
ValidateRect
IntersectRect
GetWindowWord
SetWindowWord
DrawStateA
DestroyIcon
GetFocus
IsWindowEnabled
DrawFrameControl
GetWindowTextA
CharUpperBuffA
GetIconInfo
GetDC
ShowScrollBar
SetScrollRange
wsprintfA
SetScrollInfo
GetScrollRange
GetScrollPos
EnableScrollBar
InflateRect
GetClassLongA
DrawIconEx
CreatePopupMenu
DestroyMenu
GetMenuItemInfoA
GetDesktopWindow
LockWindowUpdate
ScreenToClient
IsWindowVisible
SetCapture
ReleaseCapture
DestroyWindow
DrawEdge
FillRect
DrawTextA
BeginPaint
EndPaint
ClientToScreen
PtInRect
InvalidateRect
UpdateWindow
UnregisterClassA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetKeyState
CopyAcceleratorTableA
SetMenu
GetSysColor
OffsetRect
IsRectEmpty
GetWindowInfo
GetWindow
IsZoomed
MoveWindow
ShowWindow
ReleaseDC
GetWindowDC
SetWindowRgn
SetWindowPos
RemovePropA
SetPropA
SetWindowLongA
CallWindowProcA
DefWindowProcA
DispatchMessageA
GetMessageA
UnhookWindowsHookEx
SetWindowsHookExA
GetParent
GetWindowLongA
GetActiveWindow
GetPropA
GetMenuState
CallNextHookEx
RedrawWindow
SetActiveWindow
SystemParametersInfoA
GetClassNameA
GetCursorPos
SetForegroundWindow
TrackPopupMenu
LoadMenuA
GetClassInfoA
RegisterClassA
GetWindowTextLengthA
GetDlgCtrlID
GetMessageTime
GetForegroundWindow
MapDialogRect
SetWindowContextHelpId
SetMenuDefaultItem
IsWindow
RegisterWindowMessageA
MessageBoxA
EnableWindow
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowRect
LoadBitmapA
KillTimer
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSystemMenu
AppendMenuA
FindWindowA
LoadImageA
SetTimer
LoadIconA
PostMessageA
SendMessageA
SetScrollPos
EndDialog
IsWindowUnicode
DefDlgProcA
DrawFocusRect
ExcludeUpdateRgn
ShowCaret
GetScrollInfo
MapWindowPoints
gdi32
IntersectClipRect
SelectClipRgn
GetRgnBox
GetTextMetricsA
ExtTextOutA
UnrealizeObject
PatBlt
SetBrushOrgEx
CreatePatternBrush
PlayEnhMetaFile
SetWindowOrgEx
StretchDIBits
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetTextExtentPoint32A
GetViewportExtEx
GetWindowExtEx
PtVisible
Escape
GetMapMode
DPtoLP
GetTextColor
GetBkColor
LPtoDP
RectVisible
GetClipBox
ExtSelectClipRgn
SetStretchBltMode
SetDIBitsToDevice
CreateDIBSection
CreateDIBitmap
SaveDC
TextOutA
CreatePen
MoveToEx
LineTo
ExtFloodFill
GetDeviceCaps
SelectPalette
RealizePalette
CreateBitmap
SetBkColor
GetObjectA
CreateICA
GetDIBits
DeleteDC
GetRegionData
ExtCreateRegion
GetTextExtentPointA
CreateSolidBrush
SetTextColor
CreateFontIndirectA
SelectObject
SetBkMode
GetStockObject
GetPixel
ExcludeClipRect
BitBlt
CreateRectRgnIndirect
OffsetRgn
CreateRectRgn
CombineRgn
DeleteObject
RestoreDC
Polygon
StretchBlt
CreateCompatibleDC
CreateCompatibleBitmap
PtInRegion
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegDeleteValueA
RegCreateKeyA
RegCloseKey
RegSetValueExA
RegOpenKeyA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
shell32
Shell_NotifyIconA
ExtractIconExA
comctl32
_TrackMouseEvent
ImageList_GetIconSize
InitCommonControlsEx
ImageList_Create
ImageList_AddMasked
ImageList_Draw
ImageList_GetIcon
ImageList_Destroy
ImageList_GetImageCount
ImageList_DrawEx
ord17
oledlg
ord8
ole32
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
StgOpenStorageOnILockBytes
olepro32
ord253
oleaut32
VariantChangeType
SysAllocStringByteLen
SysAllocString
VariantCopy
VariantClear
SysAllocStringLen
VariantTimeToSystemTime
SysStringLen
SysFreeString
Sections
.text Size: 500KB - Virtual size: 498KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ