Static task
static1
Behavioral task
behavioral1
Sample
b17068dd2e95591c383fa7d50a670e27_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b17068dd2e95591c383fa7d50a670e27_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b17068dd2e95591c383fa7d50a670e27_JaffaCakes118
-
Size
584KB
-
MD5
b17068dd2e95591c383fa7d50a670e27
-
SHA1
a2a3acb7df261aff37d1388283133f6a78040a28
-
SHA256
1cbda6d7ad7fdd1ceff5319cd0b0420cb6ec70d2157d118262ce3fc1a40f269a
-
SHA512
f1fa92c06f2530b7714f70b1ab189075fd8b55e8112ca4623dbd95805d08c88fa47ba8422616d607989e8e296b735d5c7ba48a5145737a85f185bdee4598d4fe
-
SSDEEP
12288:KC8FYrRBHGn8R0fqo/AAvbZmuFWVotrlSl+8/xUTrUQ0:KD2BEieAyZFWGdEYTrz0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b17068dd2e95591c383fa7d50a670e27_JaffaCakes118
Files
-
b17068dd2e95591c383fa7d50a670e27_JaffaCakes118.exe windows:4 windows x86 arch:x86
a3a7ac5d7f8e804969ed9d3caf8fb8b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
wininet
HttpSendRequestA
InternetConnectA
InternetGetConnectedState
InternetOpenUrlA
InternetCrackUrlA
InternetGetLastResponseInfoA
shlwapi
SHSetValueA
PathFindFileNameA
SHGetValueA
PathFindExtensionA
PathIsDirectoryA
PathAppendA
PathFileExistsA
PathRemoveExtensionA
PathIsUNCA
PathStripToRootA
advapi32
RegQueryValueA
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetNamedSecurityInfoA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
kernel32
GlobalFree
FileTimeToSystemTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
SystemTimeToFileTime
SetFileAttributesA
GetFileAttributesA
GetFileSize
GetModuleHandleA
GlobalDeleteAtom
lstrcmpA
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThread
GlobalAddAtomA
FreeResource
CreateSemaphoreA
ReleaseSemaphore
GetModuleFileNameW
InterlockedDecrement
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
InterlockedIncrement
MoveFileA
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetThreadLocale
DuplicateHandle
GetFullPathNameA
FindNextFileA
TlsGetValue
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
SetErrorMode
WritePrivateProfileStringA
GetCurrentDirectoryA
GlobalFlags
GetCPInfo
GetOEMCP
GetSystemTimeAsFileTime
RtlUnwind
HeapFree
HeapAlloc
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
GetProcessHeap
GetStartupInfoA
WriteConsoleW
GetFileType
GetStdHandle
ExitThread
CreateThread
HeapSize
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
GetConsoleCP
GetConsoleMode
GetACP
GetTimeZoneInformation
LCMapStringA
LCMapStringW
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
DebugBreak
SetStdHandle
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
GetStringTypeA
GetStringTypeW
SetEnvironmentVariableA
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
MulDiv
CreateEventA
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
RaiseException
LocalAlloc
SetFilePointer
WriteFile
ReadFile
LocalFree
GetComputerNameA
GetCurrentProcess
SetPriorityClass
DeviceIoControl
CreateMutexA
GetSystemTime
GetCurrentThreadId
ExitProcess
DeleteCriticalSection
SetLastError
GetVolumeInformationA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
LoadLibraryA
GetProcAddress
FreeLibrary
Sleep
GetTempFileNameA
GetCurrentProcessId
lstrlenA
lstrcmpiA
CompareStringW
CompareStringA
GetVersion
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
GetTempPathA
GetModuleFileNameA
GetShortPathNameA
lstrcatA
CopyFileA
DeleteFileA
CreateFileA
GetFileTime
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
CloseHandle
GetLastError
CreateDirectoryA
user32
ReleaseDC
GetDC
LoadCursorA
ClientToScreen
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
BeginPaint
EndPaint
UnregisterClassA
DestroyMenu
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
GetSysColorBrush
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
UnhookWindowsHookEx
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
SendMessageA
GetKeyState
PeekMessageA
ValidateRect
wsprintfA
GetParent
GetClassNameA
GetSystemMetrics
ShowWindow
IsDialogMessageA
GetForegroundWindow
GetWindowThreadProcessId
BringWindowToTop
GetClientRect
SetWindowTextA
WaitForInputIdle
EnumThreadWindows
EnumChildWindows
SendMessageTimeoutA
PostMessageA
EnableWindow
RegisterWindowMessageA
SetParent
SetTimer
EnumWindows
GetWindowTextA
GetCursorPos
CharUpperA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
PostQuitMessage
gdi32
RestoreDC
SaveDC
DeleteObject
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
ExtTextOutA
TextOutA
RectVisible
PtVisible
SetMapMode
Escape
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
OleRun
CoInitializeEx
CoCreateInstance
CoDisconnectObject
CoGetMalloc
oleaut32
SysAllocStringByteLen
SysStringLen
VariantClear
SysFreeString
SysAllocStringLen
SysAllocString
VariantCopy
VariantInit
GetErrorInfo
LoadTypeLi
VariantChangeType
Sections
.text Size: 456KB - Virtual size: 454KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ