Static task
static1
Behavioral task
behavioral1
Sample
b5c519de34059341fc850490737b4d3e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b5c519de34059341fc850490737b4d3e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b5c519de34059341fc850490737b4d3e_JaffaCakes118
-
Size
996KB
-
MD5
b5c519de34059341fc850490737b4d3e
-
SHA1
ceed5cb5d9547de547f510af267ce0b3deaf8162
-
SHA256
5046a89cd2f6c6d752033e103306bc79dbede4e973eea96e0451b981b3508e4d
-
SHA512
8898d32ce2daba027d134b5ce9a5e6aa86fbf0626e43dc666f34f7b7f4a414fe0af38628f6a167d47b2222381009910b4337023ee84f65b7c37949bf1561aedf
-
SSDEEP
24576:5XjhTrY08eMZq6HZaPaa1cjMMy4iGP1FmgV9fCLG9/:xVTM08eMZq6cPaZwpyNFDVcLGR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b5c519de34059341fc850490737b4d3e_JaffaCakes118
Files
-
b5c519de34059341fc850490737b4d3e_JaffaCakes118.exe windows:5 windows x86 arch:x86
c31752cfe8287960ce61f7a206c37d57
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
userenv
GetProfilesDirectoryA
kernel32
GlobalUnlock
FlushInstructionCache
RaiseException
SetLastError
EnterCriticalSection
GetModuleHandleA
LoadLibraryExA
DeleteCriticalSection
GetCurrentThreadId
lstrcatA
GetPrivateProfileStringA
lstrcpynA
WritePrivateProfileStringA
CreateThread
WaitForSingleObject
SleepEx
CreateProcessA
GetFileAttributesA
GetFileSize
SetFilePointer
ReadFile
GetComputerNameA
GetVolumeInformationA
RemoveDirectoryA
GetTickCount
GetCurrentProcessId
HeapReAlloc
CreateToolhelp32Snapshot
Process32First
Process32Next
TerminateProcess
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
RtlUnwind
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
HeapSize
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetStdHandle
HeapCreate
GetStartupInfoA
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualProtect
GetSystemTimeAsFileTime
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedCompareExchange
CreateFileA
MoveFileExA
GetCurrentProcess
HeapFree
GetProcessHeap
WriteFile
Sleep
GetExitCodeProcess
MultiByteToWideChar
IsDBCSLeadByte
MulDiv
LeaveCriticalSection
SizeofResource
InitializeCriticalSection
GlobalLock
InterlockedIncrement
LoadResource
FindResourceA
GetVersionExA
GetCurrentDirectoryA
SetCurrentDirectoryA
InterlockedDecrement
GlobalFree
GlobalAlloc
OpenProcess
HeapAlloc
LoadLibraryA
FreeLibrary
ExitProcess
GetProcAddress
lstrlenA
lstrcmpA
lstrcmpiA
lstrlenW
WideCharToMultiByte
lstrcpyA
DeleteFileA
LocalFree
GetTempPathA
CloseHandle
FindNextFileA
GetModuleFileNameA
LocalAlloc
FindClose
GetLastError
FindFirstFileA
CreateDirectoryA
user32
SetFocus
SetForegroundWindow
GetMessageA
GetShellWindow
GetWindowThreadProcessId
IsDialogMessageA
TranslateMessage
DispatchMessageA
FindWindowA
ShowWindow
PostQuitMessage
GetClientRect
SendMessageA
GetDC
GetWindowLongA
CreateWindowExA
DefWindowProcA
UnregisterClassA
SetCursor
IsDlgButtonChecked
CheckRadioButton
PostMessageA
SystemParametersInfoA
LoadIconA
UpdateWindow
ExitWindowsEx
MessageBoxA
ClientToScreen
DestroyWindow
GetClassNameA
DestroyAcceleratorTable
ScreenToClient
IsChild
GetClassInfoExA
SetCapture
DrawTextA
GetFocus
GetParent
InvalidateRgn
CharNextA
GetWindowTextLengthA
RegisterWindowMessageA
GetWindowTextA
CreateAcceleratorTableA
RedrawWindow
GetDesktopWindow
GetSysColor
SetWindowPos
IsWindow
ReleaseCapture
CallWindowProcA
LoadCursorA
GetWindow
MoveWindow
GetWindowRect
FillRect
GetDlgItem
SetWindowTextA
EnableWindow
GetDlgCtrlID
EndPaint
RegisterClassExA
GetWindowDC
BeginPaint
DrawFocusRect
SetWindowLongA
InvalidateRect
ReleaseDC
GetUserObjectSecurity
gdi32
CreateDIBitmap
GetDeviceCaps
DeleteObject
CreateCompatibleBitmap
BitBlt
DeleteDC
SetBkColor
CreateCompatibleDC
GetObjectA
CreateSolidBrush
SetTextColor
SelectObject
TextOutA
CreateFontA
SetBkMode
GetStockObject
advapi32
RegOpenKeyA
RegEnumKeyA
RegDeleteValueA
RegQueryInfoKeyA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
AdjustTokenPrivileges
GetUserNameA
IsValidSid
GetSecurityDescriptorOwner
RegOpenKeyExA
LookupPrivilegeValueA
LookupAccountSidA
GetTokenInformation
ConvertSidToStringSidA
OpenProcessToken
RegCreateKeyA
RegQueryValueExA
RegCloseKey
SetFileSecurityA
FreeSid
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
shell32
ord680
SHGetFolderPathA
ShellExecuteA
SHFileOperationA
ShellExecuteExA
ole32
OleInitialize
StringFromGUID2
CreateStreamOnHGlobal
CLSIDFromString
OleUninitialize
CoTaskMemRealloc
OleLockRunning
CoSetProxyBlanket
CoCreateInstance
CoTaskMemFree
CoGetClassObject
CoUninitialize
CoTaskMemAlloc
CoInitializeEx
CLSIDFromProgID
oleaut32
SysAllocString
SysStringLen
VariantClear
SysAllocStringByteLen
LoadTypeLi
VariantInit
SysAllocStringLen
LoadRegTypeLi
VarUI4FromStr
OleCreateFontIndirect
SysFreeString
shlwapi
wnsprintfA
PathFileExistsA
StrNCatA
StrStrA
AssocQueryStringA
StrToIntA
StrStrIA
Sections
.text Size: 202KB - Virtual size: 202KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 697KB - Virtual size: 706KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ