Static task
static1
Behavioral task
behavioral1
Sample
baf524cbcb6527cae2eff86d820b2352_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
baf524cbcb6527cae2eff86d820b2352_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
baf524cbcb6527cae2eff86d820b2352_JaffaCakes118
-
Size
568KB
-
MD5
baf524cbcb6527cae2eff86d820b2352
-
SHA1
5cc85fb71117cd9b5e0fa2223bb4551b4fdc939b
-
SHA256
7595d5a08542096312e5976f368772691ea2fd99287164a8037400b68d5c2e85
-
SHA512
157ab3f4e8a4831403b2a2e2351083eaf4c0a9e706b867ba6fb2964564c5d71a978c60d4fbb23180f645a66ebd957f3fda7a686aa0b30b1d8160413357c1f4ed
-
SSDEEP
12288:lvafymel2GIhkKsmDavbfMJJSZegE6QAKaKSlAV/1OTrXZd:VafyKvYYJY4u51dhTrpd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource baf524cbcb6527cae2eff86d820b2352_JaffaCakes118
Files
-
baf524cbcb6527cae2eff86d820b2352_JaffaCakes118.exe windows:4 windows x86 arch:x86
b5f423720be425cc1640789485c713c0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
wininet
HttpSendRequestA
InternetConnectA
InternetGetConnectedState
InternetOpenUrlA
InternetCrackUrlA
InternetGetLastResponseInfoA
shlwapi
PathFindFileNameA
PathFindExtensionA
PathAppendA
PathFileExistsA
SHGetValueA
PathRemoveExtensionA
PathIsUNCA
PathStripToRootA
advapi32
RegQueryValueA
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
SetSecurityDescriptorDacl
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
kernel32
GlobalDeleteAtom
lstrcmpA
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThread
GlobalAddAtomA
GetCurrentProcessId
FreeResource
CreateSemaphoreA
ReleaseSemaphore
GetModuleFileNameW
InterlockedDecrement
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
InterlockedIncrement
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
GetThreadLocale
DuplicateHandle
FindClose
FindFirstFileA
GetFullPathNameA
FindNextFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
TlsGetValue
GlobalReAlloc
GetModuleHandleA
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
WritePrivateProfileStringA
GetCurrentDirectoryA
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
GetFileAttributesA
GetSystemTimeAsFileTime
RtlUnwind
HeapFree
HeapAlloc
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
GetProcessHeap
GetStartupInfoA
WriteConsoleW
GetFileType
GetStdHandle
ExitThread
CreateThread
HeapSize
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
GetConsoleCP
GetConsoleMode
GetACP
GetTimeZoneInformation
LCMapStringA
LCMapStringW
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
DebugBreak
SetStdHandle
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
GetStringTypeA
GetStringTypeW
SetEnvironmentVariableA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
MulDiv
CreateEventA
SuspendThread
SetEvent
WaitForSingleObject
GetCurrentThreadId
ResumeThread
SetThreadPriority
RaiseException
LocalAlloc
SetFilePointer
WriteFile
ReadFile
LocalFree
GetComputerNameA
DeleteFileA
GetCurrentProcess
SetPriorityClass
DeviceIoControl
CreateMutexA
ExitProcess
GetTempFileNameA
DeleteCriticalSection
SetLastError
GetVolumeInformationA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
LoadLibraryA
GetProcAddress
FreeLibrary
Sleep
lstrlenA
lstrcmpiA
CompareStringW
CompareStringA
GetVersion
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
GetTempPathA
GetModuleFileNameA
lstrcatA
CopyFileA
DosDateTimeToFileTime
LocalFileTimeToFileTime
CreateFileA
GetFileTime
CompareFileTime
GetSystemTime
SystemTimeToFileTime
SetFileTime
CloseHandle
GetLastError
GlobalHandle
CreateDirectoryA
user32
GetDC
LoadCursorA
ClientToScreen
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
BeginPaint
EndPaint
UnregisterClassA
DestroyMenu
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ReleaseDC
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
UnhookWindowsHookEx
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
SendMessageA
GetKeyState
GetSysColorBrush
ShowWindow
SetWindowTextA
IsDialogMessageA
PeekMessageA
ValidateRect
wsprintfA
GetParent
GetClassNameA
GetWindowThreadProcessId
GetSystemMetrics
PostMessageA
EnableWindow
RegisterWindowMessageA
SetParent
SetTimer
EnumWindows
GetWindowTextA
GetCursorPos
CharUpperA
LoadIconA
LoadBitmapA
gdi32
SaveDC
DeleteObject
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
RestoreDC
GetDeviceCaps
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
ExtTextOutA
TextOutA
RectVisible
PtVisible
SetMapMode
Escape
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
CoInitializeEx
CoCreateInstance
CoDisconnectObject
CoGetMalloc
oleaut32
SysAllocString
SysAllocStringLen
VariantClear
SysFreeString
VariantCopy
VariantInit
VariantChangeType
LoadTypeLi
SysStringLen
SysAllocStringByteLen
Sections
.text Size: 440KB - Virtual size: 438KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ