Static task
static1
Behavioral task
behavioral1
Sample
bcd4baeb03a8bbd5a9e31a2750573eff_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bcd4baeb03a8bbd5a9e31a2750573eff_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bcd4baeb03a8bbd5a9e31a2750573eff_JaffaCakes118
-
Size
488KB
-
MD5
bcd4baeb03a8bbd5a9e31a2750573eff
-
SHA1
ca24e8452d99147d0c35722e340b26db48b52c7a
-
SHA256
497f6bc599491643dcb42661928ed895e2011456cfedaf93a37c829c1b61528a
-
SHA512
9c166fc0e2be2b47881206567125db05950d205c400753664fca5ada6b6186d3ee5aa5a92c88f50f7da819b173169de1bbe8b1367864f5ced0bb74e3e045cfcd
-
SSDEEP
12288:jXB3Pn+/NfyhfHOBsbwjrK/8HlVmgGMC5RJvb:t/WyhPOubwjrzHlVmo+Jv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bcd4baeb03a8bbd5a9e31a2750573eff_JaffaCakes118
Files
-
bcd4baeb03a8bbd5a9e31a2750573eff_JaffaCakes118.exe windows:4 windows x86 arch:x86
2fe20a3608d3a6ee953a861f432f81c8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
shlwapi
PathRemoveFileSpecA
netapi32
Netbios
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
user32
GrayStringA
DrawTextA
TabbedTextOutA
RedrawWindow
GetParent
EnumDisplayDevicesA
CopyRect
GetSysColor
FillRect
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
IsIconic
DrawIcon
ScreenToClient
GetClientRect
PtInRect
PostQuitMessage
LoadIconA
FindWindowA
HideCaret
ShowCaret
ExcludeUpdateRgn
DefDlgProcA
SendDlgItemMessageA
PeekMessageA
SetFocus
AdjustWindowRectEx
GetLastActivePopup
TrackPopupMenu
TranslateMessage
DispatchMessageA
EnableWindow
LoadBitmapA
PostMessageA
LoadImageA
SetRect
GetDC
ReleaseDC
BringWindowToTop
SetWindowPos
SystemParametersInfoA
GetSystemMetrics
IsWindow
GetCursorPos
SetMenuDefaultItem
GetSubMenu
LoadMenuA
GetDesktopWindow
IsWindowVisible
GetFocus
SetCapture
GetCapture
InvalidateRect
SetCursor
OffsetRect
KillTimer
SetTimer
GetWindowRect
SendMessageA
LoadCursorA
RegisterWindowMessageA
MessageBoxA
IsRectEmpty
DrawFrameControl
SetForegroundWindow
ClientToScreen
IsWindowUnicode
PostThreadMessageA
RegisterClipboardFormatA
MessageBeep
CopyAcceleratorTableA
LoadStringA
CharUpperA
MapDialogRect
SetWindowContextHelpId
ValidateRect
CharNextA
GetWindowDC
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
MoveWindow
IsDialogMessageA
SetRectEmpty
SetWindowRgn
GetSysColorBrush
ReleaseCapture
SetWindowsHookExA
UnhookWindowsHookEx
EqualRect
InflateRect
UnionRect
DestroyMenu
GetWindowLongA
GetNextDlgTabItem
GetActiveWindow
WindowFromPoint
TrackPopupMenuEx
DrawFocusRect
FrameRect
DefWindowProcA
EndPaint
BeginPaint
UpdateWindow
ShowWindow
CreateWindowExA
GetMessageA
UnregisterClassA
DestroyWindow
SetWindowLongA
GetClassNameA
MapWindowPoints
DrawEdge
GetNextDlgGroupItem
TrackMouseEvent
SetWindowTextA
GetTopWindow
IsChild
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetWindow
IntersectRect
GetWindowPlacement
EndDialog
SetActiveWindow
CreateDialogIndirectParamA
GetDlgItem
IsWindowEnabled
CallNextHookEx
winmm
waveOutGetNumDevs
waveOutGetDevCapsA
kernel32
CreateProcessA
FileTimeToSystemTime
FileTimeToLocalFileTime
Process32Next
TerminateProcess
GetExitCodeProcess
OpenProcess
lstrcmpiA
Process32First
GetSystemDirectoryA
LoadLibraryA
GetModuleFileNameA
FreeLibrary
SetCurrentDirectoryA
MoveFileA
ExitProcess
GetSystemTime
GetCurrentThreadId
CreateEventA
GlobalFree
GlobalUnlock
GlobalLock
ResumeThread
GlobalAlloc
LockResource
SizeofResource
LoadResource
FindResourceA
WaitForSingleObject
ResetEvent
SetEvent
GetPriorityClass
MultiByteToWideChar
LocalFree
FormatMessageA
ExpandEnvironmentStringsA
GetComputerNameA
GlobalMemoryStatus
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
GetProfileStringA
QueryPerformanceCounter
QueryPerformanceFrequency
HeapFree
HeapAlloc
GetProcessHeap
GetVersion
TerminateThread
GetProcAddress
CreateDirectoryA
GetTickCount
FindClose
FindNextFileA
GetModuleHandleA
GetShortPathNameA
MoveFileExA
LeaveCriticalSection
GetLocalTime
EnterCriticalSection
InitializeCriticalSection
DeleteCriticalSection
WriteFile
ReadFile
GetFileSize
lstrcpyA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
lstrcatA
SetLastError
InterlockedIncrement
InterlockedDecrement
lstrlenA
WideCharToMultiByte
GetThreadLocale
GetCurrentThread
lstrcmpA
lstrcpynA
DuplicateHandle
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFullPathNameA
LocalAlloc
GlobalFlags
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GetProcessVersion
GetCPInfo
GetOEMCP
GetFileAttributesA
GetFileTime
WritePrivateProfileStringA
SetErrorMode
RtlUnwind
CreateThread
ExitThread
GetStartupInfoA
GetCommandLineA
RaiseException
SetStdHandle
GetFileType
GetTimeZoneInformation
GetACP
HeapReAlloc
HeapSize
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
CreateMutexA
ReleaseMutex
Sleep
CreateToolhelp32Snapshot
Module32First
FindFirstFileA
DeleteFileA
SetFileAttributesA
MulDiv
GetVersionExA
GetCurrentProcess
SetPriorityClass
GetLastError
CreateFileA
DeviceIoControl
CloseHandle
gdi32
CombineRgn
GetTextExtentPointA
PatBlt
IntersectClipRect
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetClipBox
SelectClipRgn
GetPixel
CreateBitmap
SetBkColor
SetTextColor
CreateDIBitmap
GetStockObject
StretchBlt
Escape
TextOutA
RectVisible
PtVisible
LPtoDP
GetMapMode
GetWindowExtEx
GetViewportExtEx
DPtoLP
GetCurrentObject
GetBkColor
GetTextColor
GetBkMode
GetTextExtentPoint32A
CreateRectRgn
ExtTextOutA
CreateSolidBrush
CreateCompatibleBitmap
SelectObject
CreateDCA
DeleteDC
GetDeviceCaps
CreateCompatibleDC
BitBlt
GetObjectA
CreateFontIndirectA
DeleteObject
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegCloseKey
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyA
RegEnumValueA
RegOpenKeyExA
shell32
SHGetSpecialFolderPathA
SHFileOperationA
ShellExecuteExA
Shell_NotifyIconA
ShellExecuteA
comctl32
ord17
_TrackMouseEvent
ImageList_Destroy
oledlg
ord8
ole32
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CreateStreamOnHGlobal
CoInitialize
OleFlushClipboard
OleIsCurrentClipboard
olepro32
ord253
ord251
oleaut32
SysFreeString
SysAllocStringByteLen
SysStringLen
VariantCopy
SysAllocStringLen
VariantTimeToSystemTime
SysAllocString
VariantClear
VariantChangeType
urlmon
URLDownloadToFileA
wininet
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetQueryDataAvailable
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetSetOptionExA
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
DeleteUrlCacheEntry
InternetGetConnectedState
InternetGetLastResponseInfoA
rpcrt4
UuidCreate
UuidToStringA
RpcStringFreeA
Sections
.text Size: 292KB - Virtual size: 288KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 140KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ