Static task
static1
Behavioral task
behavioral1
Sample
ba4a7e01708a33cf2cfc893546030ac0_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ba4a7e01708a33cf2cfc893546030ac0_JaffaCakes118
-
Size
308KB
-
MD5
ba4a7e01708a33cf2cfc893546030ac0
-
SHA1
acec1394e6ba63836c5c5300579b3b51bf32e924
-
SHA256
8edb84a8b6b5068fc7254da51724a986b9d06680d2c36a585bf0f998ac970f40
-
SHA512
cbe72d0aacaebad926face8a509cc56919e3ed81a58d0021a5ab838fb2a9b5e9a353310e3a46f4b2a0075764786d49694bd91f13af59b98b78856ad4406852c3
-
SSDEEP
6144:zbOiNh3Ru6YSwXaJRD5aWoqARLxvkW60IzHGdFl/hVqNC0Yh:zbOoh3R1NJqNtvkp1slJVqXq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ba4a7e01708a33cf2cfc893546030ac0_JaffaCakes118
Files
-
ba4a7e01708a33cf2cfc893546030ac0_JaffaCakes118.exe windows:4 windows x86 arch:x86
0f72a71f686a8255a2b6923b71d0cd39
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHFileOperationA
SHGetSpecialFolderPathA
SHGetFolderPathA
wininet
InternetCloseHandle
shlwapi
PathRemoveExtensionA
PathFindFileNameA
PathGetArgsA
SHGetValueA
PathAppendA
PathFileExistsA
PathFindExtensionA
PathIsDirectoryA
PathStripToRootA
PathIsUNCA
kernel32
GetFileSize
GetThreadLocale
DuplicateHandle
FindClose
FindFirstFileA
GetFullPathNameA
FindNextFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
LocalAlloc
CreateSemaphoreA
ReleaseSemaphore
GlobalGetAtomNameA
GetModuleHandleA
InterlockedDecrement
InterlockedIncrement
GetCurrentProcessId
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetFileTime
GlobalFlags
GetCurrentThreadId
SetEndOfFile
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GetLocaleInfoA
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
RtlUnwind
VirtualAlloc
RaiseException
HeapAlloc
HeapFree
HeapReAlloc
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetFileInformationByHandle
PeekNamedPipe
GetFileType
GetProcessHeap
GetStartupInfoA
SetStdHandle
HeapSize
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
GetConsoleCP
GetConsoleMode
GetACP
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
OpenProcess
RemoveDirectoryA
Sleep
CreateMutexA
lstrcmpA
lstrcpyA
SetLastError
GetVolumeInformationA
GetCommandLineA
GetFileAttributesA
DeleteFileA
GetVersionExA
GetCurrentProcess
SetPriorityClass
GetModuleFileNameA
GetShortPathNameA
CreateFileA
DeviceIoControl
WaitForSingleObject
TerminateProcess
CloseHandle
OutputDebugStringA
GetSystemTime
GetTimeZoneInformation
FormatMessageA
LocalFree
LoadResource
LockResource
SizeofResource
FindResourceA
GetSystemTimeAsFileTime
SystemTimeToFileTime
GetComputerNameA
LoadLibraryA
GetProcAddress
FreeLibrary
MoveFileExA
GetTempPathA
GetLastError
lstrlenA
lstrcmpiA
WideCharToMultiByte
CompareStringA
CompareStringW
MultiByteToWideChar
InterlockedExchange
GetVersion
user32
EnableMenuItem
ModifyMenuA
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
DestroyMenu
PostQuitMessage
CheckMenuItem
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetWindowPos
SetWindowLongA
IsWindow
GetDlgItem
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
GetFocus
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
UnregisterClassA
CharUpperA
MessageBoxA
EnumWindows
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
PostMessageA
FindWindowExA
GetWindowThreadProcessId
SendMessageTimeoutA
RegisterWindowMessageA
FindWindowA
GetWindowTextA
GetWindow
GetDesktopWindow
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetSystemMetrics
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
gdi32
DeleteObject
GetStockObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegEnumKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
ole32
CoGetMalloc
StringFromIID
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 224KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ