Static task
static1
Behavioral task
behavioral1
Sample
ad39be7ae32b5790a51503fdcf7a72d3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ad39be7ae32b5790a51503fdcf7a72d3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ad39be7ae32b5790a51503fdcf7a72d3_JaffaCakes118
-
Size
195KB
-
MD5
ad39be7ae32b5790a51503fdcf7a72d3
-
SHA1
e8026c07569f7be2b1840dc7195fa912cde9850b
-
SHA256
d1ebd965c074b614695da1c60d9dd656d5b28a4ce7af413b167283a2dba904ca
-
SHA512
eb961dcb10788051c3c6430f06cf7ec9a75c9ba319b1826944d2ac463f4fdccd38d3550a098d703eb9c6347e4ca7a92914f9a287767c3026717a8abdde44014e
-
SSDEEP
3072:Q8hY8KNrEoJq941rwBGkvTR1YBfoTgL1qKurN7dxPjTw2dItCCwppDuqq:QKYaoJq9DvTzYBg3tPYR6Bq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad39be7ae32b5790a51503fdcf7a72d3_JaffaCakes118
Files
-
ad39be7ae32b5790a51503fdcf7a72d3_JaffaCakes118.exe windows:4 windows x86 arch:x86
38ec033b79f19d724cee8e7537da4d5e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
HeapSize
GetCPInfo
RaiseException
GetACP
GetOEMCP
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStdHandle
HeapDestroy
HeapCreate
VirtualFree
TerminateProcess
LoadLibraryA
MulDiv
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetLocaleInfoW
LCMapStringA
LCMapStringW
SetStdHandle
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
ExitProcess
HeapFree
HeapAlloc
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
RtlUnwind
GlobalGetAtomNameA
GlobalAddAtomA
SetErrorMode
SizeofResource
WritePrivateProfileStringA
GlobalFlags
GetProcessVersion
GetVersion
SetLastError
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
GetModuleFileNameA
lstrcmpiA
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
FindFirstFileA
lstrcpyA
FindClose
SetUnhandledExceptionFilter
GetProcAddress
SetFilePointer
FlushFileBuffers
WriteFile
GetLastError
GetCurrentProcess
IsBadReadPtr
MultiByteToWideChar
WideCharToMultiByte
Sleep
lstrlenA
InterlockedDecrement
lstrcatA
IsBadWritePtr
IsBadCodePtr
VirtualAlloc
GlobalDeleteAtom
FreeLibrary
GetCurrentThreadId
GetCurrentThread
lstrcmpA
GetProfileStringA
GlobalLock
GlobalAlloc
CloseHandle
user32
GetDlgItemTextA
IsDialogMessageA
SetWindowTextA
ShowWindow
CharUpperA
LoadStringA
DestroyMenu
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetSysColorBrush
ReleaseCapture
GetDesktopWindow
WindowFromPoint
ClientToScreen
GetClassNameA
PtInRect
SetRectEmpty
LoadAcceleratorsA
TranslateAcceleratorA
LoadMenuA
SetMenu
ReuseDDElParam
UnpackDDElParam
InvalidateRect
BringWindowToTop
IntersectRect
InflateRect
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetSubMenu
GetMenuItemID
ScreenToClient
UpdateWindow
GetWindowTextLengthA
GetWindowTextA
CreateWindowExA
SetPropA
UnhookWindowsHookEx
GetForegroundWindow
SetForegroundWindow
GetPropA
RemovePropA
CallWindowProcA
GetMessageTime
GetMessagePos
GetWindow
GetWindowRect
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetParent
GetNextDlgTabItem
GetMessageA
TranslateMessage
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
MessageBoxA
SetCursor
ShowOwnedPopups
SetTimer
KillTimer
WaitMessage
PeekMessageA
DispatchMessageA
PostMessageA
EnableWindow
PostQuitMessage
IsIconic
GetSystemMetrics
SystemParametersInfoA
GetClientRect
DrawIcon
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
EqualRect
DeferWindowPos
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
SendDlgItemMessageA
GetMenuItemCount
GetMenu
GetSystemMenu
AppendMenuA
SendMessageA
LoadIconA
DefWindowProcA
GetDlgCtrlID
GetLastActivePopup
GetTopWindow
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
OffsetRect
CharNextA
IsWindowUnicode
gdi32
CreateBitmap
SetBkColor
GetObjectA
DeleteDC
SaveDC
RestoreDC
GetStockObject
SelectObject
SetBkMode
SetMapMode
SetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
OffsetViewportOrgEx
SetWindowExtEx
GetClipBox
ScaleWindowExtEx
IntersectClipRect
DeleteObject
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextExtentPointA
PatBlt
CreateDIBitmap
CreateCompatibleDC
BitBlt
SetTextColor
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
shell32
DragFinish
DragQueryFileA
comctl32
ord17
ImageList_Destroy
wsock32
bind
accept
htonl
closesocket
htons
ioctlsocket
shutdown
WSAAsyncSelect
inet_ntoa
recvfrom
sendto
connect
socket
WSASetLastError
WSAStartup
WSACleanup
setsockopt
WSAGetLastError
gethostbyname
recv
send
Sections
.text Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE