Static task
static1
Behavioral task
behavioral1
Sample
c1bd7ab4c1b8c23e0622343a5aca2f94_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c1bd7ab4c1b8c23e0622343a5aca2f94_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c1bd7ab4c1b8c23e0622343a5aca2f94_JaffaCakes118
-
Size
188KB
-
MD5
c1bd7ab4c1b8c23e0622343a5aca2f94
-
SHA1
fe28d224a331a433d61c1d99540e25e9ff3dcf14
-
SHA256
5d2fa812766b9aa3f8ac3a2f83fae432425a401ba6719ce71e0e0b03ef477a8b
-
SHA512
812fb017bd6d876efea8c1bfd98fcac4566eaca63cf8575a42c36f4ccdad05655dca5254c050a58898660e3d2a885a51cf0ec1f470db6135b8bf42ba1ea47b20
-
SSDEEP
3072:UUW8Toa74R1JIgLGD19fdGJ75mdBxwY4v/OIogf70+I45v4uTu:UUWEoakRsD19amdHUOM0z4K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c1bd7ab4c1b8c23e0622343a5aca2f94_JaffaCakes118
Files
-
c1bd7ab4c1b8c23e0622343a5aca2f94_JaffaCakes118.exe windows:4 windows x86 arch:x86
3b35e19a1625bf3625e0580cc82da6b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasEnumConnectionsA
RasGetConnectStatusA
winmm
mciSendCommandA
kernel32
GetFullPathNameA
MulDiv
GlobalFlags
FindNextFileA
TlsAlloc
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GetProcessVersion
GetCPInfo
GetOEMCP
GlobalHandle
GetVolumeInformationA
GetFileAttributesA
GetFileSize
GetFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
SetErrorMode
RtlUnwind
HeapAlloc
ExitProcess
CreateDirectoryA
HeapFree
GetStartupInfoA
GetCommandLineA
FindFirstFileA
GetCurrentDirectoryA
WritePrivateProfileStringA
SetEndOfFile
InterlockedIncrement
GetFileType
GetTimeZoneInformation
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetModuleFileNameA
GetSystemDirectoryA
CopyFileA
WinExec
lstrlenA
lstrcpyA
CreateThread
FindClose
MoveFileA
FlushFileBuffers
UnlockFile
LockFile
ReadFile
SetFilePointer
WriteFile
DuplicateHandle
CreateFileA
GetCurrentProcess
InitializeCriticalSection
LeaveCriticalSection
DeleteCriticalSection
lstrcpynA
LocalAlloc
EnterCriticalSection
LocalFree
GetLastError
FormatMessageA
GetCurrentThread
SetLastError
lstrcmpA
CloseHandle
InterlockedDecrement
MultiByteToWideChar
WideCharToMultiByte
HeapSize
GetVersion
GetCurrentThreadId
Sleep
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
GlobalAlloc
FreeLibrary
GetTickCount
GetComputerNameA
GetSystemInfo
lstrcatA
GetVersionExA
GlobalMemoryStatus
GetDriveTypeA
GetDiskFreeSpaceA
Beep
DeleteFileA
GetPrivateProfileStringA
WaitForSingleObject
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
TerminateProcess
LoadLibraryA
GetCurrentProcessId
GetProcAddress
GetACP
SetStdHandle
RaiseException
HeapReAlloc
user32
SetFocus
GetSysColor
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
PostMessageA
LoadIconA
IsDialogMessageA
SetWindowTextA
ShowWindow
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetCursorPos
ValidateRect
TranslateMessage
PostQuitMessage
SetCursor
WaitMessage
KillTimer
SetTimer
CharUpperA
LoadStringA
GetClassNameA
PtInRect
ClientToScreen
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetSysColorBrush
DestroyMenu
AdjustWindowRectEx
GetFocus
GetClientRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetDlgCtrlID
GetKeyState
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
IsIconic
GetWindowPlacement
GetWindowRect
GetNextDlgTabItem
EndDialog
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetDC
ReleaseDC
CharToOemA
LockWindowUpdate
GetSystemMetrics
SetWindowsHookExA
PeekMessageA
GetMessageA
SetKeyboardState
DispatchMessageA
UnhookWindowsHookEx
CallNextHookEx
GetActiveWindow
GetWindowTextA
GetKeyNameTextA
GetKeyboardState
ToAscii
GetDesktopWindow
wsprintfA
ExitWindowsEx
SetCursorPos
IsWindow
CopyRect
SystemParametersInfoA
MessageBoxA
FindWindowA
EnableWindow
SendMessageA
GetWindow
IsWindowVisible
UnregisterClassA
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCA
GetClipBox
SetTextColor
SetBkColor
GetObjectA
CreateBitmap
GetDeviceCaps
GetStockObject
SaveDC
RestoreDC
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
PtVisible
TextOutA
ExtTextOutA
RectVisible
Escape
SelectObject
DeleteObject
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegQueryValueExA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
GetUserNameA
shell32
ShellExecuteA
comctl32
ord17
wsock32
sendto
recvfrom
inet_ntoa
WSAAsyncSelect
htonl
ioctlsocket
accept
WSAGetLastError
WSASetLastError
WSAStartup
WSACleanup
inet_addr
socket
connect
recv
send
closesocket
htons
gethostname
gethostbyname
setsockopt
bind
wininet
InternetOpenA
InternetCloseHandle
FtpGetCurrentDirectoryA
FtpSetCurrentDirectoryA
InternetGetLastResponseInfoA
InternetFindNextFileA
FtpFindFirstFileA
FtpGetFileA
FtpPutFileA
InternetGetConnectedState
InternetConnectA
InternetSetStatusCallback
Sections
.text Size: 124KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ