Static task
static1
Behavioral task
behavioral1
Sample
b6a8971756681d40293b1e170a3504e1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b6a8971756681d40293b1e170a3504e1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b6a8971756681d40293b1e170a3504e1_JaffaCakes118
-
Size
450KB
-
MD5
b6a8971756681d40293b1e170a3504e1
-
SHA1
151fbb64b1fa58f43cc0434b9115239cbe5f4fbe
-
SHA256
e3104af062e5f0346465140703d4f558e665b1fb2e2ca6ad74c59a9e0328d2a1
-
SHA512
dd09174d411d0232fab5e5e4467f58cad43eb393cfa26fef3f1fb2660455c1a0eb51a58db92269ae111bc5c8b6d9ae7445db586716aff6832d07cb09fa7807ff
-
SSDEEP
6144:IKJuVLs/8eAfTxDoC/gntHvhGJPk4Di+Qsw5Y0bvrJoj6s84ds4AifooyjujD2JF:tqY8treugtHJuEFOGFIgoyiWJJPXCA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b6a8971756681d40293b1e170a3504e1_JaffaCakes118
Files
-
b6a8971756681d40293b1e170a3504e1_JaffaCakes118.exe windows:5 windows x86 arch:x86
3c737250d2aef55db40ea1e319b6e544
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupDiEnumDeviceInfo
SetupGetStringFieldA
SetupDiSetDeviceInstallParamsA
SetupFindFirstLineA
SetupDiClassGuidsFromNameA
SetupDiCreateDeviceInfoA
SetupDiGetDeviceInstallParamsA
SetupDiSetDeviceRegistryPropertyA
SetupDiBuildDriverInfoList
SetupDiEnumDriverInfoA
SetupDiSetSelectedDriverA
SetupDiOpenDevRegKey
SetupOpenInfFileA
SetupCloseInfFile
SetupFindNextLine
kernel32
LockFile
WriteFile
SetEndOfFile
MoveFileA
FlushFileBuffers
FindClose
SetFilePointer
UnlockFile
DeleteFileA
GetFullPathNameA
GetStringTypeExA
GetThreadLocale
GetShortPathNameA
FindFirstFileA
GetFileSize
GetFileTime
LocalFileTimeToFileTime
GetVolumeInformationA
SetFileTime
GetFileAttributesA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetCommandLineA
HeapAlloc
HeapFree
RaiseException
RtlUnwind
CreateThread
ExitThread
SystemTimeToFileTime
HeapReAlloc
ExitProcess
TerminateProcess
GetACP
GetTimeZoneInformation
GetSystemTime
GetLocalTime
SetFileAttributesA
Sleep
SetHandleCount
GetStdHandle
DuplicateHandle
ReadFile
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
IsBadReadPtr
IsBadCodePtr
SetConsoleCtrlHandler
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalUnlock
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
GetModuleFileNameA
lstrcpynA
SetLastError
GetLastError
CloseHandle
GetCurrentProcess
GetWindowsDirectoryA
LocalAlloc
LocalFree
CreateFileA
WritePrivateProfileStringA
SetErrorMode
GetCurrentDirectoryA
GetOEMCP
GetPrivateProfileStringA
GetPrivateProfileIntA
GlobalFlags
GetCPInfo
GetCurrentThread
GetProcessVersion
lstrcmpA
MulDiv
FindResourceA
LoadLibraryA
FreeLibrary
lstrcatA
LoadResource
LockResource
GlobalAddAtomA
GlobalGetAtomNameA
lstrcmpiA
lstrcpyA
GlobalFindAtomA
GlobalDeleteAtom
CreateEventA
GetModuleHandleA
GetProcAddress
SetThreadPriority
SuspendThread
GetCurrentThreadId
WaitForSingleObject
ResumeThread
SetEvent
InterlockedIncrement
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
GetVersion
lstrlenA
TlsSetValue
TlsGetValue
LocalReAlloc
GlobalReAlloc
EnterCriticalSection
GlobalAlloc
TlsFree
GlobalLock
LeaveCriticalSection
GetFileType
GlobalHandle
GetStartupInfoA
HeapSize
FatalAppExitA
user32
AdjustWindowRectEx
IsWindow
SetActiveWindow
GetSysColor
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
PostMessageA
LoadIconA
CheckDlgButton
CheckRadioButton
GetDlgItemInt
GetDlgItemTextA
SetDlgItemInt
SetDlgItemTextA
IsDlgButtonChecked
ScrollWindowEx
IsDialogMessageA
SetWindowTextA
MoveWindow
ShowWindow
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
GetDesktopWindow
PostQuitMessage
DestroyMenu
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
ShowOwnedPopups
SetCursor
InsertMenuA
DeleteMenu
GetMenuStringA
CharUpperA
DeferWindowPos
GetClientRect
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
ScrollWindow
GetScrollInfo
SetScrollInfo
ShowScrollBar
GetScrollRange
SetScrollRange
ScreenToClient
SetFocus
GetTopWindow
IsChild
GetCapture
WinHelpA
wsprintfA
EqualRect
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
TrackPopupMenu
SetWindowPlacement
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowRect
GetSystemMetrics
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
GetScrollPos
SetScrollPos
GetClassInfoA
SetWindowsHookExA
OemToCharA
CharToOemA
LoadStringA
UnhookWindowsHookEx
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SendMessageA
MessageBoxA
EnableWindow
LoadBitmapA
GetMenuCheckMarkDimensions
GetWindowPlacement
gdi32
DeleteObject
RestoreDC
SaveDC
StartDocA
DeleteDC
SelectObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetDCOrgEx
SetPolyFillMode
SetMapMode
SetViewportOrgEx
SetStretchBltMode
SetViewportExtEx
ScaleViewportExtEx
OffsetViewportOrgEx
OffsetWindowOrgEx
SetWindowExtEx
SetWindowOrgEx
SelectClipRgn
ExcludeClipRect
ScaleWindowExtEx
OffsetClipRgn
MoveToEx
IntersectClipRect
SetTextAlign
SetTextJustification
LineTo
SetMapperFlags
GetCurrentPositionEx
SetTextCharacterExtra
SetArcDirection
PolyDraw
ArcTo
SetColorAdjustment
PolyBezierTo
PolylineTo
CreateRectRgn
SelectClipPath
GetClipRgn
PlayMetaFileRecord
SetBkMode
ExtSelectClipRgn
EnumMetaFile
SelectPalette
GetObjectType
PlayMetaFile
GetViewportExtEx
GetStockObject
CreatePen
ExtCreatePen
GetWindowExtEx
CreateHatchBrush
CreatePatternBrush
CreateSolidBrush
PtVisible
RectVisible
CreateDIBPatternBrushPt
ExtTextOutA
Escape
TextOutA
CreateBitmap
SetROP2
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyA
OpenProcessToken
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumValueA
RegSetValueExA
AdjustTokenPrivileges
RegQueryValueExA
LookupPrivilegeValueA
RegCreateKeyExA
RegRestoreKeyA
RegCloseKey
shell32
SHGetFileInfoA
DragAcceptFiles
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0x0x5 Size: 2KB - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 2KB - Virtual size: 13B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: 2KB - Virtual size: 919B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ik Size: 2KB - Virtual size: 107B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ocode Size: 2KB - Virtual size: 158B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kpack0 Size: 190KB - Virtual size: 189KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gddg8 Size: 2KB - Virtual size: 356B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.iaoq Size: 2KB - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.oxcodex Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0x0x1 Size: 2KB - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0x0x2 Size: 2KB - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0x0x Size: 192KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0x0x3 Size: 2KB - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0x0x4 Size: 2KB - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CRT Size: 2KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 450B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ