Static task
static1
Behavioral task
behavioral1
Sample
a8f335f2d7744b90fe4e740666750e93_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a8f335f2d7744b90fe4e740666750e93_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a8f335f2d7744b90fe4e740666750e93_JaffaCakes118
-
Size
228KB
-
MD5
a8f335f2d7744b90fe4e740666750e93
-
SHA1
64f33f17356bb1e7dc5f148ebe1732d69a96f176
-
SHA256
72786f8830512906b24425e8cd46e7ca5140cc4e47fa2adcb995890dc8dfb2ca
-
SHA512
3ca01d41fe625dc69e00683f2517728d8c654f03ddfca2e5df0a838f5c7ddc3cecea7c35a28783c79793146e6b4e8a574b25076be74a9abc65f746abb74c49b0
-
SSDEEP
3072:41Iq4sx19ULckHSGzBsm58WBSBE056sJVMSbrHVh+ckA5+xvvjmY6wr734JDS/oh:UIwxbNQSUBsS8WBSG0oKbr1dfguhkNqd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a8f335f2d7744b90fe4e740666750e93_JaffaCakes118
Files
-
a8f335f2d7744b90fe4e740666750e93_JaffaCakes118.exe windows:4 windows x86 arch:x86
41135a39df8e953c03b6475ebbb3ecb7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFindExtensionW
SHSetValueW
PathStripToRootW
PathIsUNCW
PathFileExistsW
PathAppendW
SHGetValueW
PathFindFileNameW
wininet
HttpQueryInfoW
HttpSendRequestW
HttpOpenRequestW
InternetCloseHandle
InternetConnectW
InternetOpenW
InternetOpenUrlW
InternetReadFile
kernel32
FileTimeToSystemTime
WritePrivateProfileStringW
GlobalFlags
CompareStringW
GetModuleHandleA
GetVersionExA
LoadLibraryA
GlobalFindAtomW
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesW
GetFileTime
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
RtlUnwind
GetFileType
GetSystemTimeAsFileTime
RaiseException
HeapReAlloc
ExitProcess
HeapSize
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
TerminateProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
SetStdHandle
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
SetEnvironmentVariableA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedDecrement
InterlockedIncrement
GetFullPathNameW
GetVolumeInformationW
FindFirstFileW
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
GetThreadLocale
GetCurrentProcessId
GlobalAddAtomW
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
LoadLibraryW
CompareStringA
InterlockedExchange
lstrcmpW
FreeLibrary
GlobalDeleteAtom
GetModuleHandleW
GetProcAddress
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
lstrlenW
GetModuleFileNameW
CreateThread
WaitForSingleObject
Sleep
CreateMutexW
GetLastError
CreateProcessW
CreateDirectoryW
GetVersionExW
SetLastError
lstrcmpiW
MultiByteToWideChar
WideCharToMultiByte
FindResourceW
LoadResource
LockResource
SizeofResource
CreateFileW
ReadFile
CloseHandle
GetStdHandle
user32
DestroyMenu
UnregisterClassW
ShowWindow
RegisterWindowMessageW
LoadIconW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
DefWindowProcW
CallWindowProcW
SetWindowLongW
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
SetWindowTextW
GetWindowTextW
UnhookWindowsHookEx
LoadCursorW
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
CharUpperW
GetSystemMetrics
GetWindowThreadProcessId
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
GetParent
SendMessageW
ModifyMenuW
EnableMenuItem
CheckMenuItem
PostMessageW
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
wsprintfW
GetClassNameW
UnregisterClassA
gdi32
DeleteDC
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
CreateBitmap
GetDeviceCaps
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetClipBox
SetMapMode
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegQueryInfoKeyW
RegEnumValueW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
SHGetSpecialFolderPathW
ShellExecuteW
oleaut32
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 176KB - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ