MyCopyMemory
Static task
static1
Behavioral task
behavioral1
Sample
af4618d33f1fcffc876de5f71bed2813_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
af4618d33f1fcffc876de5f71bed2813_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
af4618d33f1fcffc876de5f71bed2813_JaffaCakes118
-
Size
503KB
-
MD5
af4618d33f1fcffc876de5f71bed2813
-
SHA1
db8154702bc3097cfad53f819acd0e5346949d10
-
SHA256
9beadcfe005c9119ebf63ffcbc51661af5730d47a22f2e615d9bf5692ae8aa6a
-
SHA512
aa5cc9c4b9885f2ed2a2c6d09b7071d724c4ba7281fb98cfad796c6864af773af8581d0c8200076deb4f03b8d43d796fa75e24bb04a7ef692d0dc78a58404f2e
-
SSDEEP
12288:3gc+oEV7AFfijmNDQ6k74Z+BFOjtmfCjq/aQ3/vz4UM7JEW:3gchEVkFfiSNDQ6kswQxjvhxt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource af4618d33f1fcffc876de5f71bed2813_JaffaCakes118
Files
-
af4618d33f1fcffc876de5f71bed2813_JaffaCakes118.exe windows:5 windows x86 arch:x86
1583b205f02c7a045727264e5da20dd8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeW
HeapAlloc
GetProcAddress
VirtualProtect
OpenEventW
WaitForSingleObject
DuplicateHandle
GlobalHandle
SetLastError
FlushFileBuffers
GetCurrentDirectoryW
LocalAlloc
GlobalLock
CreateEventW
HeapFree
FindResourceA
RaiseException
SetThreadPriority
GetStartupInfoW
InterlockedExchange
LCMapStringW
GetPrivateProfileStringW
GlobalFlags
SetHandleCount
HeapDestroy
DisconnectNamedPipe
SearchPathW
lstrcmpiW
GetLastError
VirtualFree
lstrcmpW
GetCommandLineW
GetFileSizeEx
UnhandledExceptionFilter
HeapQueryInformation
GetFileAttributesW
ReadFile
GetConsoleOutputCP
GetWindowsDirectoryW
GetOverlappedResult
CreateDirectoryW
EnterCriticalSection
lstrcpyW
GetFileAttributesExW
LoadResource
GetVersion
FreeEnvironmentStringsW
GetConsoleTitleA
GetTickCount
TerminateProcess
GlobalFindAtomW
GetTempFileNameW
lstrcmpA
GetLocaleInfoW
GetProfileIntW
PeekNamedPipe
LoadLibraryA
GetCPInfo
GetCurrentThreadId
GlobalAlloc
FindFirstFileW
SetFilePointer
GetUserDefaultUILanguage
IsDebuggerPresent
FreeLibrary
ExitProcess
GetOEMCP
CompareStringW
FreeResource
CreateFileW
LocalFree
user32
CreateWindowExW
SetCursor
DestroyCursor
GetUpdateRect
ClientToScreen
ValidateRect
BeginPaint
ExitWindowsEx
GetParent
SendDlgItemMessageW
GetSysColorBrush
SystemParametersInfoW
GetSystemMenu
MapWindowPoints
ShowOwnedPopups
GetDoubleClickTime
GetPropW
EndDeferWindowPos
DefMDIChildProcW
TrackPopupMenu
TabbedTextOutW
GetMessageW
SetRectEmpty
RegisterWindowMessageW
SetRect
GetMenuDefaultItem
IsChild
PeekMessageW
SetClipboardData
EqualRect
ToUnicodeEx
GetNextDlgGroupItem
FrameRect
GetWindowLongW
UnregisterClassW
PostThreadMessageW
GetFocus
UnregisterClassA
CopyAcceleratorTableW
UnhookWindowsHookEx
SetActiveWindow
DrawTextExW
gdi32
OffsetRgn
GetBoundsRect
ScaleViewportExtEx
GetWindowOrgEx
Escape
RectVisible
Rectangle
GetStockObject
StretchDIBits
RestoreDC
Polygon
SetTextAlign
GetClipBox
CombineRgn
DeleteObject
GetTextCharsetInfo
SetDIBColorTable
Ellipse
SelectPalette
SetWindowOrgEx
SetTextColor
SetWindowExtEx
SetROP2
SetBkColor
EnumFontFamiliesExW
ExcludeClipRect
GetLayout
ExtFloodFill
SetPixelV
LPtoDP
SetPixel
SetBkMode
SetMapMode
GetBkMode
advapi32
RegEnumKeyW
GetSecurityDescriptorSacl
RegQueryValueW
OpenProcessToken
RegSetValueExW
RegDeleteValueW
InitializeSecurityDescriptor
CheckTokenMembership
AdjustTokenPrivileges
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegEnumKeyExW
FreeSid
RegDeleteKeyW
RegCreateKeyExW
RegEnumValueW
SetSecurityDescriptorSacl
LookupPrivilegeValueW
SetSecurityDescriptorDacl
RegCloseKey
RegOpenKeyExW
AllocateAndInitializeSid
GetTokenInformation
RegQueryValueExW
shell32
SHGetSpecialFolderPathW
SHGetDiskFreeSpaceExW
SHChangeNotify
DragFinish
SHAppBarMessage
SHBrowseForFolderW
DragQueryFileW
SHGetPathFromIDListW
DuplicateIcon
SHGetFolderPathW
SHGetFolderLocation
SHGetFileInfoW
ShellExecuteW
Shell_NotifyIconW
SHGetDesktopFolder
SHGetSpecialFolderLocation
ShellExecuteExW
ole32
OleDestroyMenuDescriptor
IsAccelerator
OleGetClipboard
OleInitialize
OleFlushClipboard
RevokeDragDrop
OleLockRunning
OleDuplicateData
DoDragDrop
OleCreateMenuDescriptor
OleTranslateAccelerator
OleIsCurrentClipboard
CoRevokeClassObject
CoInitializeEx
CLSIDFromString
CreateStreamOnHGlobal
CoLockObjectExternal
CoRegisterMessageFilter
CoFreeUnusedLibraries
CoInitialize
CoCreateInstance
OleUninitialize
CoCreateGuid
ReleaseStgMedium
CoUninitialize
CoTaskMemAlloc
RegisterDragDrop
CoTaskMemFree
oleaut32
SystemTimeToVariantTime
SysStringLen
VariantClear
SysFreeString
SysAllocStringLen
VariantTimeToSystemTime
SysAllocString
VariantChangeType
VarBstrFromDate
VariantInit
VarBstrCmp
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
shlwapi
PathStripToRootW
PathIsUNCW
PathFindExtensionW
PathFindFileNameW
ord345
PathRemoveFileSpecW
winmm
PlaySoundW
msimg32
TransparentBlt
AlphaBlend
mpr
WNetAddConnection3W
imm32
ImmReleaseContext
ImmGetOpenStatus
ImmGetContext
oledlg
OleUIBusyW
gdiplus
GdipDeleteGraphics
GdipGetImagePaletteSize
GdipDrawImageI
GdipCreateBitmapFromScan0
GdipAlloc
GdipBitmapLockBits
GdiplusStartup
GdipCloneImage
GdipGetImageHeight
GdipBitmapUnlockBits
GdipCreateBitmapFromStream
GdipGetImagePalette
GdipDisposeImage
GdipFree
GdipCreateBitmapFromHBITMAP
GdipGetImageGraphicsContext
GdipGetImagePixelFormat
GdipDrawImageRectI
GdipGetImageWidth
GdipCreateFromHDC
GdipSetInterpolationMode
GdiplusShutdown
oleacc
CreateStdAccessibleObject
LresultFromObject
AccessibleObjectFromWindow
Exports
Exports
Sections
.text Size: 151KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.55 Size: - Virtual size: 27KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qew Size: 294KB - Virtual size: 293KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vew Size: 147KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dew Size: 228KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 712B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ