Static task
static1
Behavioral task
behavioral1
Sample
b5a19f4572283cc14593db08e471aebf_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b5a19f4572283cc14593db08e471aebf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b5a19f4572283cc14593db08e471aebf_JaffaCakes118
-
Size
208KB
-
MD5
b5a19f4572283cc14593db08e471aebf
-
SHA1
299b06dd8a4e6cc3912d9c18bb82de7985e046f4
-
SHA256
d742f1fa31e18373cfa3278d187ab58ad87c3659afd01efcfbca05c9f52e558f
-
SHA512
947421664ea20938d7dae5cc47e830c925cb92f44bcfcbcd864835b6380f4304337c12ec569114dea5ff5d42f91cdd781bc9666a8c7f4c72f5caeee5f88125d2
-
SSDEEP
3072:jGsQhejYXjjv34xJt9y5Z9utufLH13tzFnVn3FmGXYICLJ:jPQhSYf34xDgfz1JF5GI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b5a19f4572283cc14593db08e471aebf_JaffaCakes118
Files
-
b5a19f4572283cc14593db08e471aebf_JaffaCakes118.exe windows:4 windows x86 arch:x86
3e521c23b7ef64c3ebcc914718312efb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupOpenInfFileA
SetupGetLineTextA
SetupCloseInfFile
shlwapi
PathCombineA
PathRemoveExtensionA
PathAddExtensionA
SHDeleteKeyA
netapi32
NetApiBufferFree
NetUserGetInfo
kernel32
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapFree
HeapAlloc
RaiseException
HeapReAlloc
HeapSize
GetACP
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
VirtualProtect
GetSystemInfo
VirtualQuery
IsBadReadPtr
IsBadCodePtr
GetLocaleInfoA
SetErrorMode
GetOEMCP
GetCPInfo
SizeofResource
GetProcessVersion
GetLastError
WideCharToMultiByte
WritePrivateProfileStringA
GlobalFlags
lstrcpynA
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
InterlockedDecrement
MulDiv
SetLastError
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
GlobalLock
GlobalAlloc
GetProfileStringA
GlobalDeleteAtom
GetCurrentThreadId
FindFirstFileA
lstrcmpiA
FindNextFileA
FindClose
RemoveDirectoryA
DeleteFileA
GetFileAttributesA
SetFileAttributesA
GetTickCount
GetSystemDirectoryA
GetWindowsDirectoryA
GetCurrentDirectoryA
LoadLibraryA
FreeLibrary
CreateFileA
GetModuleFileNameA
lstrcpyA
lstrcatA
lstrlenA
WriteFile
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
ResumeThread
GetCurrentProcess
CloseHandle
MultiByteToWideChar
CreateThread
GetVersionExA
GetModuleHandleA
GetProcAddress
lstrcmpA
GetFileType
user32
IsDialogMessageA
ClientToScreen
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
InflateRect
DestroyMenu
InvalidateRect
ScreenToClient
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
GetWindowPlacement
GetWindowRect
CopyRect
GetDC
ReleaseDC
EndDialog
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
UnregisterClassA
HideCaret
ShowCaret
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
LoadIconA
FindWindowA
GetClientRect
IsIconic
DrawIcon
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
SystemParametersInfoA
SetActiveWindow
SetForegroundWindow
wsprintfA
EnableWindow
UpdateWindow
MapWindowPoints
GetSysColor
SetWindowTextA
SendDlgItemMessageA
SendMessageA
SetFocus
GetSystemMetrics
GetDlgItem
ShowWindow
LoadStringA
SetDlgItemTextA
CallWindowProcA
AdjustWindowRectEx
IsWindowUnicode
CharNextA
DefDlgProcA
DrawFocusRect
ExcludeUpdateRgn
IntersectRect
gdi32
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
DeleteObject
ScaleViewportExtEx
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetTextExtentPointA
BitBlt
CreateCompatibleDC
PatBlt
CreateDIBitmap
CreateBitmap
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegEnumValueA
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegEnumKeyExA
GetUserNameA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyA
RegQueryValueExA
comctl32
ord17
Sections
.text Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE