Static task
static1
Behavioral task
behavioral1
Sample
af4598b43ffbf11ed2378faf02af24e5_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
af4598b43ffbf11ed2378faf02af24e5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
af4598b43ffbf11ed2378faf02af24e5_JaffaCakes118
-
Size
950KB
-
MD5
af4598b43ffbf11ed2378faf02af24e5
-
SHA1
4c652c9ed1fda64bd5ef5d32ed0a930f31c30c3f
-
SHA256
aa2f188e0427ccad928b3903cb642b3d040bd2e606fb47bd79daba1a3263a6bc
-
SHA512
1ce1c73ef0e90e490e6af7f358c855794f8b247243ac35ee29715084e9178d4aa58bd75b553287971e2587a9728cee3927450cf6e806f4c8489023fc634e5c6a
-
SSDEEP
24576:PY5afThKQp9l1hGSFOuOn7ea+Mhwhea0:vblFFDOnbhwhe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource af4598b43ffbf11ed2378faf02af24e5_JaffaCakes118
Files
-
af4598b43ffbf11ed2378faf02af24e5_JaffaCakes118.exe windows:5 windows x86 arch:x86
b73ccd464e016f03440c237c144d7ed0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
OpenProcessToken
RegCloseKey
LookupPrivilegeValueA
SetFileSecurityA
RegDeleteValueA
GetSecurityDescriptorLength
RegEnumKeyExA
RegSetValueExW
AdjustTokenPrivileges
RegEnumValueA
GetFileSecurityW
GetFileSecurityA
RegQueryValueExW
RegQueryValueExA
SetFileSecurityW
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteKeyA
msvfw32
DrawDibSetPalette
ICRemove
ole32
CoCreateInstance
OleInitialize
OleUninitialize
OleSetClipboard
DoDragDrop
comdlg32
GetOpenFileNameW
GetSaveFileNameA
GetOpenFileNameA
ChooseFontA
CommDlgExtendedError
shell32
DragAcceptFiles
SHGetSpecialFolderLocation
DragFinish
SHGetPathFromIDListA
SHBrowseForFolderA
SHFileOperationA
ShellExecuteExA
SHGetMalloc
FindExecutableA
SHChangeNotify
DragQueryFileA
Shell_NotifyIconA
SHGetFileInfoA
ExtractIconExA
DragQueryFileW
ShellExecuteA
SHGetDesktopFolder
kernel32
GetThreadPriority
SuspendThread
GetFileAttributesW
WriteConsoleA
RaiseException
BackupSeek
FindFirstChangeNotificationA
ReleaseMutex
FindCloseChangeNotification
TlsAlloc
CreateFileW
CompareFileTime
InitializeCriticalSectionAndSpinCount
WaitForSingleObject
GetConsoleOutputCP
GetStartupInfoA
CreateThread
UnhandledExceptionFilter
BackupRead
SetErrorMode
GetPrivateProfileIntA
HeapCreate
UpdateResourceA
SystemTimeToFileTime
TlsGetValue
FindNextFileA
RtlUnwind
InterlockedDecrement
GetCompressedFileSizeA
SetFileAttributesW
GlobalAlloc
GlobalLock
GetVersion
FileTimeToDosDateTime
SetFilePointer
GetProcessHeap
ExitThread
GetTimeFormatA
GetProcessAffinityMask
GetPrivateProfileStringA
MapViewOfFile
DeviceIoControl
GetFullPathNameA
GetLogicalDriveStringsA
GetDiskFreeSpaceA
LCMapStringA
GetNumberFormatA
MultiByteToWideChar
LCMapStringW
HeapFree
FindNextFileW
GetEnvironmentStrings
GetDateFormatA
FindNextChangeNotification
GetCurrentThreadId
ExpandEnvironmentStringsW
FileTimeToSystemTime
GlobalFree
GetStringTypeA
WideCharToMultiByte
LocalFileTimeToFileTime
GetLocaleInfoA
WaitForMultipleObjects
SetCurrentDirectoryW
FormatMessageA
CompareStringA
lstrlenA
SetPriorityClass
WritePrivateProfileStringA
MoveFileA
ReadFile
EnumResourceLanguagesA
GetModuleHandleW
ResetEvent
GetModuleHandleA
GlobalUnlock
ExpandEnvironmentStringsA
CompareStringW
HeapReAlloc
SetEvent
RemoveDirectoryW
GetCurrentDirectoryA
GetModuleFileNameA
GetSystemTimeAsFileTime
GetTempPathA
GetDriveTypeA
CreateFileMappingA
GetOEMCP
GetStdHandle
lstrcmpiA
SetFileAttributesA
FindFirstFileW
QueryPerformanceCounter
GetFileAttributesA
GetTickCount
CreateDirectoryW
DeleteFileW
SetLastError
GetCPInfo
GetStringTypeW
OpenFileMappingA
FindResourceA
GetFileType
IsDebuggerPresent
SetThreadPriority
GetCommandLineA
GetProfileStringA
SetUnhandledExceptionFilter
GetConsoleMode
GetProcAddress
IsValidCodePage
FindFirstFileA
FreeEnvironmentStringsA
FreeLibrary
SetEndOfFile
HeapSize
GetCurrentProcessId
GetConsoleCP
DeleteCriticalSection
VirtualAlloc
GetCurrentProcess
GetLogicalDrives
GetCurrentThread
GetSystemTime
CreateEventA
LocalFree
LoadLibraryExA
FreeEnvironmentStringsW
LoadResource
SetCurrentDirectoryA
UnmapViewOfFile
EnterCriticalSection
lstrcpyA
EndUpdateResourceA
CreateMutexA
DosDateTimeToFileTime
TlsFree
GetVersionExA
GetLastError
CloseHandle
BeginUpdateResourceA
RemoveDirectoryA
VirtualFree
FlushFileBuffers
LoadLibraryA
GetPriorityClass
SizeofResource
MoveFileW
FindClose
GetFileTime
GetLocalTime
Sleep
SetStdHandle
TerminateProcess
MulDiv
GetCurrentDirectoryW
FileTimeToLocalFileTime
TlsSetValue
WriteFile
IsDBCSLeadByte
WriteConsoleW
GlobalMemoryStatus
SetEnvironmentVariableA
GetACP
GetCommandLineW
DeleteFileA
HeapAlloc
GetFullPathNameW
CreateDirectoryA
EnumResourceNamesA
GlobalSize
CopyFileA
GetEnvironmentStringsW
SetFileTime
SetHandleCount
ExitProcess
LeaveCriticalSection
CreateFileA
ResumeThread
InterlockedIncrement
gdi32
GetPixel
StretchBlt
CreatePatternBrush
MoveToEx
SetBkColor
SetMapMode
GetDeviceCaps
GetMapMode
CreateCompatibleDC
GetObjectA
BitBlt
ExtTextOutA
Rectangle
Polygon
LineTo
CreateFontA
SetPixel
GetTextMetricsA
DeleteDC
SelectObject
CreateBitmap
GetTextFaceA
DPtoLP
SetTextColor
DeleteObject
CreateSolidBrush
GetTextExtentPoint32A
Polyline
CreatePen
TextOutA
CreateCompatibleBitmap
comctl32
PropertySheetA
ImageList_Remove
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
ImageList_ReplaceIcon
ImageList_Add
user32
EmptyClipboard
IsDlgButtonChecked
GetDlgItemTextA
GetPropA
CharUpperW
IsWindowVisible
InsertMenuA
PtInRect
GetClassNameA
SetTimer
SetDlgItemTextA
IsChild
OpenClipboard
LoadCursorA
IsCharUpperW
CreateDialogParamA
SetDlgItemInt
GetSystemMenu
SetClipboardData
ShowWindow
PeekMessageA
TranslateAcceleratorA
SetWindowTextW
IsDialogMessageA
GetSubMenu
EndPaint
TrackPopupMenu
CreateDialogIndirectParamA
DestroyIcon
CopyImage
SetPropA
SetWindowLongA
CharLowerW
CheckDlgButton
KillTimer
GetDC
GetWindowThreadProcessId
EnableMenuItem
DialogBoxParamA
GetMessageA
LoadIconA
IsWindowEnabled
DestroyWindow
GetWindowRect
CreateIconIndirect
MessageBeep
IntersectRect
ClientToScreen
LoadAcceleratorsA
CloseClipboard
IsIconic
GetFocus
AppendMenuW
ValidateRect
CreateWindowExA
GetParent
SetWindowPlacement
InvalidateRect
CharUpperA
SendMessageW
IsCharUpperA
ExitWindowsEx
LoadBitmapA
GetIconInfo
SetCursor
SetWindowTextA
GetMenuItemCount
WindowFromPoint
SendMessageA
CharLowerA
TranslateMessage
FindWindowExA
LoadStringA
GetSystemMetrics
OemToCharBuffA
GetWindowPlacement
ScrollWindowEx
SendDlgItemMessageA
GetClipboardData
GetKeyState
GetWindowLongA
CharToOemBuffA
GetDialogBaseUnits
MoveWindow
CopyIcon
GetSysColor
ScreenToClient
SetScrollRange
PostQuitMessage
CheckMenuItem
IsWindow
RegisterClipboardFormatA
AppendMenuA
GetDesktopWindow
GetWindowTextA
GetMenu
GetLastActivePopup
GetWindowTextLengthA
ReleaseDC
GetWindow
DispatchMessageA
FlashWindow
LoadMenuA
GetClientRect
DrawIconEx
PostThreadMessageA
CallWindowProcA
PostMessageA
MapWindowPoints
CreatePopupMenu
UpdateWindow
SetFocus
DestroyMenu
OemToCharA
RegisterClassA
LoadImageA
CharToOemA
IsCharAlphaA
EnableWindow
GetDlgItemInt
InsertMenuItemA
CreateIcon
GetMenuState
EnumChildWindows
SetDlgItemTextW
RemovePropA
SetWindowPos
GetDlgItem
GetCursorPos
DrawMenuBar
GetMenuItemInfoA
FindWindowA
DeleteMenu
RegisterWindowMessageA
GetWindowTextW
FillRect
EndDialog
GetMenuItemID
DefWindowProcA
SetScrollPos
IsCharAlphaW
RedrawWindow
SetForegroundWindow
SetMenu
SetMenuItemInfoA
EnumWindows
BringWindowToTop
MessageBoxA
BeginPaint
Sections
.text Size: 516KB - Virtual size: 515KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 406KB - Virtual size: 3.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ