Static task
static1
Behavioral task
behavioral1
Sample
aef74e70533fcbb17050bf8b4da5834e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aef74e70533fcbb17050bf8b4da5834e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aef74e70533fcbb17050bf8b4da5834e_JaffaCakes118
-
Size
499KB
-
MD5
aef74e70533fcbb17050bf8b4da5834e
-
SHA1
616cae70973ff15c132dda1b73383496e10826ed
-
SHA256
44f89031cab85ab1b402820fbb0e83cd78916b263edfa1690afa6aea9df97063
-
SHA512
8b1c04166cb18674493a5b6bfee17d8327bb38ef09bd6003bd3ac87afde8ce70041db770e79012f95c072c34bb5baa6fa82a066f61075f1cbe81ac1d8314cc7c
-
SSDEEP
12288:Aw1FgbB9kRPcnswVylP6tgQjOCpEBy+Z8yMMnMMMMMkg:AMFgbQx8swVylPKgQB+BDhMMnMMMMMkg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aef74e70533fcbb17050bf8b4da5834e_JaffaCakes118
Files
-
aef74e70533fcbb17050bf8b4da5834e_JaffaCakes118.exe windows:4 windows x86 arch:x86
c6db2b8d6b18d55220da1544bf55f764
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSAConnect
setsockopt
ole32
OleLoad
OleSave
user32
GetClassNameA
BeginPaint
GetSysColor
CharLowerBuffA
DdeConnect
GetCursor
CharUpperA
GetMenuItemID
EnableWindow
GetCaretPos
WaitMessage
TranslateMDISysAccel
GetWindowRgn
GetKeyboardLayout
DestroyWindow
TabbedTextOutA
DdeAbandonTransaction
RegisterClassExA
GetLastActivePopup
InflateRect
IsRectEmpty
GetMenuItemInfoA
DialogBoxParamA
CharLowerBuffW
CreatePopupMenu
ClientToScreen
WindowFromPoint
IsCharAlphaA
DeferWindowPos
CreateDialogParamA
MsgWaitForMultipleObjects
DestroyCursor
GetWindowTextA
CharNextA
FillRect
EqualRect
ShowWindow
CopyRect
DrawMenuBar
SetWindowTextA
SendMessageA
DdeCreateDataHandle
DestroyCaret
GetMenu
ClipCursor
PostQuitMessage
ShowScrollBar
keybd_event
GetScrollInfo
DdeInitializeA
GetQueueStatus
SendDlgItemMessageA
SetTimer
IsChild
SetWindowsHookExW
EmptyClipboard
CharUpperBuffA
GetMenuState
EnumThreadWindows
DdeDisconnect
GetClipboardData
DdeClientTransaction
ShowCursor
DdeGetLastError
OffsetRect
GetMenuItemCount
EndPaint
DdeNameService
DdeCmpStringHandles
CharPrevA
DdePostAdvise
SetClipboardData
ReleaseCapture
LoadIconA
WinHelpA
CallWindowProcA
DefMDIChildProcA
GetDlgItem
GetFocus
GetCursorPos
SetFocus
InvalidateRgn
DispatchMessageA
MapWindowPoints
KillTimer
ShowCaret
PostMessageA
GetCaretBlinkTime
DestroyIcon
SetWindowContextHelpId
DdeUninitialize
ToAscii
CallNextHookEx
MoveWindow
GetAsyncKeyState
DdeQueryStringA
LoadCursorA
GetScrollPos
ModifyMenuA
RegisterClassA
CreateIcon
GetWindowLongA
GetDC
CreateAcceleratorTableA
ScreenToClient
GetSystemMenu
GetDesktopWindow
GetDCEx
VkKeyScanW
UnregisterClassA
WaitForInputIdle
RemovePropA
VkKeyScanA
DdeFreeDataHandle
DeleteMenu
GetUpdateRect
SystemParametersInfoA
GetForegroundWindow
MessageBoxIndirectA
TrackPopupMenu
MessageBoxA
BringWindowToTop
GetClassInfoA
EndDialog
GetMessagePos
GetWindowTextLengthA
SetWindowsHookExA
HideCaret
GetIconInfo
EnableMenuItem
EndDeferWindowPos
MessageBeep
GetMenuStringA
CharToOemA
GetWindowRect
DrawFrameControl
CheckMenuItem
LoadBitmapA
SetScrollRange
LoadImageA
IsWindowVisible
GetWindowThreadProcessId
GetSystemMetrics
CloseClipboard
SetKeyboardState
AdjustWindowRect
AttachThreadInput
GetClassInfoExA
RemoveMenu
DdeCreateStringHandleA
SetScrollPos
LoadAcceleratorsA
GetTabbedTextExtentA
DdeGetData
CharToOemBuffA
EnumClipboardFormats
DestroyMenu
SetCursor
GetSubMenu
OemToCharA
FindWindowA
SetDlgItemTextA
SetScrollInfo
InsertMenuA
SetCapture
AppendMenuA
DrawIcon
GetDoubleClickTime
DrawFocusRect
GetCapture
SetWindowLongA
UnhookWindowsHookEx
SetCursorPos
BeginDeferWindowPos
SetPropA
PeekMessageW
GetParent
SetCaretPos
GetWindowDC
CreateCaret
SetForegroundWindow
PtInRect
GetActiveWindow
GetKeyState
RegisterClipboardFormatA
SetActiveWindow
PeekMessageA
PostMessageW
InvalidateRect
FrameRect
GetWindow
IsZoomed
UpdateWindow
TranslateMessage
AdjustWindowRectEx
GetUpdateRgn
CharLowerA
DefWindowProcA
SetParent
IsIconic
IntersectRect
CharUpperBuffW
SetWindowPos
SetWindowRgn
GetClipboardFormatNameA
DefFrameProcA
DdeSetUserHandle
DestroyAcceleratorTable
CopyAcceleratorTableA
PostThreadMessageA
CreateMenu
DdeQueryConvInfo
CreateWindowExA
CreateCursor
GetKeyboardState
SetMenuItemInfoA
LockWindowUpdate
IsClipboardFormatAvailable
IsDialogMessageA
IsWindow
GetClientRect
GetMessageTime
DrawTextA
SetMenu
OpenClipboard
LoadStringA
ReleaseDC
FindWindowW
SetRect
GetPropA
wsprintfA
DdeFreeStringHandle
SetMenuDefaultItem
IsWindowEnabled
SubtractRect
advapi32
RegDeleteKeyW
ReportEventA
RegEnumKeyW
AdjustTokenPrivileges
RegCreateKeyW
RegisterEventSourceA
OpenProcessToken
RegOpenKeyA
RegOpenKeyW
RegQueryValueA
RegSetValueExW
RegEnumValueA
RegDeleteKeyA
RegEnumKeyA
DeregisterEventSource
LookupPrivilegeValueA
RegOpenKeyExA
RegDeleteValueW
RegDeleteValueA
RegSetValueExA
RegEnumValueW
RegQueryValueExA
InitializeSecurityDescriptor
RegQueryValueExW
RegSetValueA
RegCloseKey
RegQueryInfoKeyA
SetSecurityDescriptorDacl
RegCreateKeyA
kernel32
FormatMessageA
GetFileType
GetUserDefaultLangID
GlobalHandle
HeapDestroy
GetVolumeInformationA
VirtualFree
UnlockFile
GetTempFileNameA
SetLastError
GlobalUnlock
IsDBCSLeadByte
CreateProcessA
FormatMessageW
ExitThread
GetFileAttributesA
FreeResource
GlobalAddAtomA
FindResourceA
GetLocaleInfoA
FreeEnvironmentStringsA
RtlUnwind
TlsFree
FindNextFileA
LCMapStringA
LoadLibraryA
FreeLibrary
SearchPathA
TlsAlloc
GetLastError
HeapFree
VirtualProtect
GlobalSize
SetEnvironmentVariableA
CreateSemaphoreA
GetCommandLineA
ResetEvent
ReleaseSemaphore
LeaveCriticalSection
DuplicateHandle
WinExec
GetModuleFileNameA
HeapReAlloc
GlobalDeleteAtom
SetFilePointer
lstrlenA
GetProfileStringA
GetCurrentThreadId
lstrcmpA
FlushInstructionCache
LockFile
GetTempPathA
GetStringTypeW
SetHandleCount
GlobalLock
GlobalFree
GetWindowsDirectoryA
GetModuleHandleA
IsBadCodePtr
GetSystemInfo
HeapCreate
GetEnvironmentStringsW
ResumeThread
GetSystemDirectoryA
SetEndOfFile
SetFileAttributesA
lstrcmpiA
GetDateFormatA
InitializeCriticalSection
DeleteCriticalSection
GetDriveTypeA
CloseHandle
GetUserDefaultLCID
GetCurrentProcessId
MoveFileA
WriteFile
_llseek
FileTimeToSystemTime
VirtualAlloc
GetOEMCP
FindFirstFileA
MultiByteToWideChar
GetTimeZoneInformation
GetVersion
TlsSetValue
GetStringTypeExA
GetFullPathNameA
GetVersionExA
SetCurrentDirectoryA
SetLocalTime
FreeEnvironmentStringsW
GetShortPathNameA
SizeofResource
CreateThread
SystemTimeToFileTime
ExitProcess
lstrcpynA
CreateFileA
RemoveDirectoryA
InterlockedIncrement
FileTimeToLocalFileTime
GetACP
GetCurrentDirectoryA
GetStringTypeA
GetExitCodeProcess
lstrcpyA
LoadResource
CreateEventA
ReadFile
_lread
FlushFileBuffers
GetStartupInfoA
SetStdHandle
WideCharToMultiByte
CompareStringW
InterlockedDecrement
GetCurrentProcess
MulDiv
WaitForSingleObject
TerminateProcess
SetErrorMode
VirtualQuery
lstrcmpiW
GetSystemDefaultLangID
IsBadReadPtr
GetSystemTime
GetModuleFileNameW
SetEvent
HeapAlloc
LCMapStringW
lstrcatA
GlobalReAlloc
CreateProcessW
GetTickCount
LoadLibraryExA
HeapSize
CreateDirectoryA
GetSystemDefaultLCID
UnhandledExceptionFilter
TlsGetValue
SetFileTime
EnterCriticalSection
_lclose
_lwrite
CompareStringA
Sleep
RaiseException
FindClose
DeleteFileA
GetStdHandle
GetLocalTime
GetFileTime
LockResource
GetCPInfo
GlobalAlloc
GetEnvironmentStrings
GetProcAddress
ddraw
DirectDrawEnumerateA
samlib
SamConnectWithCreds
SamConnect
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 451KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ