MyCopyMemory
Static task
static1
Behavioral task
behavioral1
Sample
afeaa1010fc384b904a4fc646900cffa_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
afeaa1010fc384b904a4fc646900cffa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
afeaa1010fc384b904a4fc646900cffa_JaffaCakes118
-
Size
842KB
-
MD5
afeaa1010fc384b904a4fc646900cffa
-
SHA1
35e78ff070cd9ed0860df760a919f181873d7730
-
SHA256
b51f2d8f44f65f006a2285daba2581f9aebb3213fd0fb0375de4d81adff8eb32
-
SHA512
0700a078a082d0f4f36efa3798ebf1878369e3af86d19e22af3c8618a34fa07267d16e98d55e732a7730dc1a6b7b6a9283e2101df9afbadddfda9668d3b2dbec
-
SSDEEP
24576:IPBon7zgThLjM05rlHuwfTfyaHnsXdvOKvp7:IPBoehLIk5OwbfLMNvj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource afeaa1010fc384b904a4fc646900cffa_JaffaCakes118
Files
-
afeaa1010fc384b904a4fc646900cffa_JaffaCakes118.exe windows:5 windows x86 arch:x86
6e9776db308968370d9eb5e7a02ebd2c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeW
HeapAlloc
GetProcAddress
VirtualProtect
SetUnhandledExceptionFilter
GetCurrentProcess
OpenEventW
WaitForSingleObject
DuplicateHandle
GlobalHandle
SetLastError
FlushFileBuffers
GetCurrentDirectoryW
LocalAlloc
GlobalLock
CreateEventW
HeapFree
FindResourceA
RaiseException
SetThreadPriority
GetStartupInfoW
InterlockedExchange
LCMapStringW
GetPrivateProfileStringW
GlobalFlags
SetHandleCount
HeapDestroy
DisconnectNamedPipe
SearchPathW
GetLastError
lstrcmpiW
VirtualFree
lstrcmpW
GetCommandLineW
GetFileSizeEx
UnhandledExceptionFilter
HeapQueryInformation
GetFileAttributesW
ReadFile
GetConsoleOutputCP
GetWindowsDirectoryW
GetOverlappedResult
CreateDirectoryW
EnterCriticalSection
lstrcpyW
GetFileAttributesExW
LoadResource
GetVersion
FreeEnvironmentStringsW
GetConsoleTitleA
GetTickCount
TerminateProcess
GlobalFindAtomW
GetTempFileNameW
lstrcmpA
GetLocaleInfoW
GetProfileIntW
PeekNamedPipe
LoadLibraryA
GetCPInfo
GetCurrentThreadId
GlobalAlloc
FindFirstFileW
SetFilePointer
GetUserDefaultUILanguage
IsDebuggerPresent
FreeLibrary
ExitProcess
GetOEMCP
CompareStringW
FreeResource
CreateFileW
LocalFree
user32
DrawTextExW
ClientToScreen
BeginPaint
CreateWindowExW
SetCursor
GetSysColorBrush
RegisterWindowMessageW
ValidateRect
SendDlgItemMessageW
SystemParametersInfoW
GetSystemMenu
GetDoubleClickTime
GetPropW
DestroyCursor
MapWindowPoints
GetUpdateRect
IsChild
ShowOwnedPopups
EndDeferWindowPos
DefMDIChildProcW
ExitWindowsEx
GetParent
TabbedTextOutW
GetMessageW
SetRectEmpty
SetRect
TrackPopupMenu
SetClipboardData
EqualRect
ToUnicodeEx
GetNextDlgGroupItem
FrameRect
GetWindowLongW
UnregisterClassW
PostThreadMessageW
GetFocus
UnregisterClassA
CopyAcceleratorTableW
UnhookWindowsHookEx
SetActiveWindow
PeekMessageW
GetMenuDefaultItem
gdi32
OffsetRgn
GetBoundsRect
ScaleViewportExtEx
StretchDIBits
Escape
RectVisible
Rectangle
RestoreDC
Polygon
SetTextAlign
GetClipBox
CombineRgn
DeleteObject
GetTextCharsetInfo
SetDIBColorTable
Ellipse
SelectPalette
SetWindowOrgEx
SetTextColor
SetWindowExtEx
SetROP2
SetBkColor
EnumFontFamiliesExW
ExcludeClipRect
GetLayout
ExtFloodFill
SetPixelV
LPtoDP
SetPixel
SetBkMode
GetBkMode
GetStockObject
SetMapMode
GetWindowOrgEx
advapi32
RegEnumValueW
GetSecurityDescriptorSacl
RegQueryValueW
OpenProcessToken
RegSetValueExW
RegDeleteValueW
InitializeSecurityDescriptor
CheckTokenMembership
AdjustTokenPrivileges
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegEnumKeyExW
FreeSid
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyW
SetSecurityDescriptorSacl
LookupPrivilegeValueW
SetSecurityDescriptorDacl
RegCloseKey
RegOpenKeyExW
AllocateAndInitializeSid
GetTokenInformation
RegQueryValueExW
shell32
SHGetDiskFreeSpaceExW
SHChangeNotify
DragFinish
SHAppBarMessage
SHGetSpecialFolderPathW
SHBrowseForFolderW
DragQueryFileW
SHGetFolderPathW
SHGetFolderLocation
SHGetFileInfoW
ShellExecuteW
Shell_NotifyIconW
SHGetDesktopFolder
SHGetSpecialFolderLocation
ShellExecuteExW
DuplicateIcon
SHGetPathFromIDListW
ole32
CoLockObjectExternal
IsAccelerator
OleFlushClipboard
RevokeDragDrop
OleLockRunning
OleDuplicateData
DoDragDrop
OleCreateMenuDescriptor
OleTranslateAccelerator
OleIsCurrentClipboard
CoRevokeClassObject
CoInitializeEx
CLSIDFromString
OleDestroyMenuDescriptor
CreateStreamOnHGlobal
CoRegisterMessageFilter
OleInitialize
OleGetClipboard
CoFreeUnusedLibraries
OleUninitialize
CoCreateGuid
ReleaseStgMedium
CoUninitialize
CoInitialize
CoCreateInstance
CoTaskMemAlloc
RegisterDragDrop
CoTaskMemFree
oleaut32
VariantClear
SystemTimeToVariantTime
VariantTimeToSystemTime
SysStringByteLen
SysFreeString
SysAllocStringLen
SysAllocString
SysAllocStringByteLen
VariantChangeType
VariantInit
VarBstrCmp
VarBstrCat
SysStringLen
VarBstrFromDate
shlwapi
PathStripToRootW
PathIsUNCW
PathFindExtensionW
PathFindFileNameW
ord345
PathRemoveFileSpecW
winmm
PlaySoundW
msimg32
TransparentBlt
AlphaBlend
mpr
WNetAddConnection3W
imm32
ImmReleaseContext
ImmGetOpenStatus
ImmGetContext
oledlg
OleUIBusyW
gdiplus
GdiplusStartup
GdipCreateBitmapFromScan0
GdipAlloc
GdipBitmapLockBits
GdipCloneImage
GdipDeleteGraphics
GdipGetImageHeight
GdipBitmapUnlockBits
GdipCreateBitmapFromStream
GdipGetImagePalette
GdipDisposeImage
GdipFree
GdipCreateBitmapFromHBITMAP
GdipGetImageGraphicsContext
GdipGetImagePixelFormat
GdipDrawImageRectI
GdipGetImageWidth
GdipCreateFromHDC
GdiplusShutdown
GdipDrawImageI
GdipSetInterpolationMode
GdipGetImagePaletteSize
oleacc
AccessibleObjectFromWindow
LresultFromObject
CreateStdAccessibleObject
Exports
Exports
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.14 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.55 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 828B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.10 Size: 311KB - Virtual size: 311KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.11 Size: 512B - Virtual size: 92B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.12 Size: 161KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.13 Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.15 Size: 188KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 712B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ