Static task
static1
Behavioral task
behavioral1
Sample
b228f9508f4199b389ca9b60e9d1fab0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b228f9508f4199b389ca9b60e9d1fab0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b228f9508f4199b389ca9b60e9d1fab0_JaffaCakes118
-
Size
870KB
-
MD5
b228f9508f4199b389ca9b60e9d1fab0
-
SHA1
469f7f8a22e7c4827f5d4ecdd7fd3069d3c6988d
-
SHA256
6cc355e8dc28ef28d0f750ce7a6dceb13cf1b30bc27b92c8b398e9d78d380179
-
SHA512
62b2c71fb7b2dc46933c89cc0b7b375e239476e4d12043f591b375b4b2b285fa3b0ce517cdb27ccbbe4cc0643f2606241b29019d706cea8714be185e8e04901e
-
SSDEEP
24576:aK5BQa47ogm7QwuQbSgH56bDk6TMls+IEfiRu+X:b471aQwujbDrv+xfis
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b228f9508f4199b389ca9b60e9d1fab0_JaffaCakes118
Files
-
b228f9508f4199b389ca9b60e9d1fab0_JaffaCakes118.exe windows:5 windows x86 arch:x86
d489e93d6fc4624711548e764d2434e7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
CreateMutexW
GetExitCodeThread
LockResource
GetProcAddress
QueryPerformanceCounter
GetVersionExW
MulDiv
GetCurrentProcessId
HeapAlloc
TerminateProcess
Sleep
WaitForMultipleObjects
FindResourceExW
WaitForSingleObject
SystemTimeToFileTime
SetCurrentDirectoryW
GetCurrentThreadId
HeapCreate
GetBinaryTypeW
GetTickCount
LoadResource
HeapFree
CreateEventW
FileTimeToSystemTime
GetUserDefaultLCID
OpenEventW
FindResourceA
GetStartupInfoW
InitializeCriticalSection
lstrlenW
CreateThread
lstrcmpiW
SetLastError
CloseHandle
DelayLoadFailureHook
EnterCriticalSection
CreateIoCompletionPort
GetSystemDirectoryW
HeapReAlloc
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
VirtualAlloc
lstrlenA
HeapDestroy
CompareStringW
OutputDebugStringA
GetModuleHandleW
GetUserDefaultUILanguage
LeaveCriticalSection
HeapSize
ProcessIdToSessionId
GetCurrentThread
GetQueuedCompletionStatus
FlushInstructionCache
GetSystemInfo
LoadLibraryExA
FindResourceW
FreeLibrary
VirtualFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ResumeThread
RaiseException
ExitProcess
GetSystemTimeAsFileTime
LoadLibraryW
TerminateThread
HeapSetInformation
LocalFree
LoadLibraryA
LocalAlloc
LoadLibraryExW
PostQueuedCompletionStatus
OpenProcess
GetProcessHeap
FormatMessageW
ReleaseMutex
ExpandEnvironmentStringsW
MultiByteToWideChar
GetSystemTime
GetLastError
ResetEvent
GetSystemWindowsDirectoryW
GetVersionExA
SizeofResource
SetEvent
DeleteCriticalSection
user32
IsWindowEnabled
GetFocus
LoadMenuW
MoveWindow
TranslateAcceleratorW
LoadCursorW
CheckDlgButton
UnregisterClassA
LoadStringW
LoadAcceleratorsW
KillTimer
SetWindowLongW
GetMenu
DefWindowProcW
CreateWindowExW
SetWindowTextW
GetWindowLongW
IsDlgButtonChecked
IsWindowVisible
GetClassNameW
DestroyIcon
SetCursor
EnumChildWindows
TranslateMessage
TrackPopupMenuEx
ShowWindow
GetDC
AdjustWindowRectEx
CharNextW
EnableWindow
ReleaseDC
GetProcessDefaultLayout
RegisterClassExW
DestroyMenu
SetWindowPos
GetSystemMetrics
GetSysColor
DestroyWindow
SendMessageW
InvalidateRect
GetMonitorInfoW
IsIconic
LockWindowUpdate
PostMessageW
IsZoomed
PostQuitMessage
GetClassInfoExW
GetKeyState
GetWindowPlacement
GetSysColorBrush
ClientToScreen
SetFocus
CharLowerBuffW
CheckMenuRadioItem
GetDlgItem
GetSubMenu
GetClientRect
GetWindowThreadProcessId
GetMessageW
CallWindowProcW
SystemParametersInfoW
MonitorFromRect
SetTimer
DeleteMenu
GetWindowRect
TrackMouseEvent
DispatchMessageW
EnableMenuItem
GetShellWindow
MonitorFromPoint
IsWindow
BringWindowToTop
GetParent
SetActiveWindow
gdi32
GetDeviceCaps
AbortDoc
GetTextExtentPointA
StartDocA
GetStockObject
StartPage
DeleteDC
EndPage
SetMapMode
TextOutA
SelectObject
EndDoc
SetBkColor
StretchBlt
DeleteObject
ExtTextOutA
CreateFontA
CreateCompatibleDC
CreateSolidBrush
SetBkMode
GetTextMetricsA
SetTextColor
CreateFontIndirectA
SetAbortProc
CreateCompatibleBitmap
GetObjectA
GetTextExtentPoint32A
advapi32
OpenProcessToken
RegOpenKeyA
AdjustTokenPrivileges
StartServiceA
LookupPrivilegeValueA
DeleteService
InitializeSecurityDescriptor
RegDeleteValueA
RegDeleteKeyA
OpenServiceA
RegQueryValueExA
RegSetValueExA
SetSecurityDescriptorDacl
RegCreateKeyA
CloseServiceHandle
RegCloseKey
CreateServiceA
QueryServiceStatus
OpenSCManagerA
ControlService
RegOpenKeyExA
shell32
ShellExecuteExA
SHBrowseForFolderA
SHGetMalloc
Shell_NotifyIconA
ShellExecuteA
SHGetSpecialFolderLocation
ole32
CoRevertToSelf
CoInitializeSecurity
CoUninitialize
OleGetClipboard
CoRegisterClassObject
CoRevokeClassObject
CoImpersonateClient
PropVariantClear
OleUninitialize
CoInitialize
CreateStreamOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
OleInitialize
CoTaskMemRealloc
StringFromCLSID
CoGetClassObject
CoResumeClassObjects
oleaut32
SysAllocString
SafeArrayLock
SafeArrayGetLBound
SafeArrayGetUBound
VariantClear
VariantCopyInd
SysStringLen
SysAllocStringByteLen
SafeArrayDestroy
VariantInit
GetErrorInfo
SafeArrayUnlock
VarUI4FromStr
VarBstrCmp
SysFreeString
VariantCopy
SysAllocStringLen
SafeArrayCreate
LoadRegTypeLi
VarBstrCat
SafeArrayRedim
LoadTypeLi
SysStringByteLen
DispCallFunc
comctl32
ImageList_Add
shlwapi
SHStrDupW
UrlUnescapeW
ColorHLSToRGB
UrlEscapeW
rpcrt4
UuidToStringA
UuidCreateNil
UuidCreate
UuidFromStringA
UuidIsNil
RpcStringFreeA
wldap32
ord22
gdiplus
GdiplusStartup
Sections
.text Size: 177KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 357KB - Virtual size: 357KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 149KB - Virtual size: 5.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.textg Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 57B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ