Static task
static1
Behavioral task
behavioral1
Sample
c855594f3f6725a3452b9a328b763fe0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c855594f3f6725a3452b9a328b763fe0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c855594f3f6725a3452b9a328b763fe0_JaffaCakes118
-
Size
505KB
-
MD5
c855594f3f6725a3452b9a328b763fe0
-
SHA1
d6080150b0d4974b7aff42392893ed7817e39c4b
-
SHA256
daf241a59c3fa1df9a6b74f49bddd7fb3e0dd6f706d46de05f221aff62376fc5
-
SHA512
71a50fbfb998e269efea6b18acd1c61ef71d20b539ed2b462fd32504749f9b5f7b18217c8ac839ecec0f7b3f77a07870ca72fc21f8d88855e041b608caa7a006
-
SSDEEP
6144:NmcemOBxaGdzcUQk7JY+KWTtvQHxFxFBU8NSNP7ucydRadq1o1AZHl2+kQaLdsm+:dwaGdzcRWTtUFxFBUFDydRopgHlXkPc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c855594f3f6725a3452b9a328b763fe0_JaffaCakes118
Files
-
c855594f3f6725a3452b9a328b763fe0_JaffaCakes118.exe windows:5 windows x86 arch:x86
a79205c79fd49e6a481cea4a7593d6cd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoA
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
ExitThread
CreateThread
HeapSize
GetACP
IsValidCodePage
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetStdHandle
InitializeCriticalSectionAndSpinCount
HeapCreate
GetCommandLineA
VirtualFree
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetDriveTypeA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
GetSystemTimeAsFileTime
GetDateFormatA
GetTimeFormatA
HeapAlloc
HeapFree
ExitProcess
RtlUnwind
GetTickCount
SetErrorMode
GetFileTime
GetFileSizeEx
GetCurrentDirectoryA
WritePrivateProfileStringA
GetModuleHandleW
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
InterlockedIncrement
CreateFileA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
GetModuleFileNameW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcmpA
FormatMessageA
LocalFree
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
SetLastError
lstrcmpW
MultiByteToWideChar
TerminateThread
SuspendThread
CreateEventA
SetEvent
WaitForSingleObject
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
LoadLibraryExA
GetLastError
MulDiv
GetLogicalDriveStringsA
GetDiskFreeSpaceExA
lstrlenW
InterlockedDecrement
GetFileAttributesA
GetSystemTime
MoveFileA
CreateDirectoryA
GetProcAddress
ResumeThread
SetThreadPriority
FindFirstFileA
SetFileAttributesA
RemoveDirectoryA
DeleteFileA
FindNextFileA
FindClose
OpenProcess
TerminateProcess
Sleep
GetCurrentProcessId
LoadLibraryA
lstrlenA
GetVersionExA
GetModuleFileNameA
GetModuleHandleA
FreeLibrary
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
CreateProcessA
CloseHandle
user32
GetNextDlgGroupItem
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableA
UnregisterClassA
GetSysColorBrush
CharNextA
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
CharUpperA
DestroyMenu
SetWindowContextHelpId
MapDialogRect
CreateDialogIndirectParamA
EndDialog
GetWindowThreadProcessId
PostQuitMessage
GetMessageA
TranslateMessage
GetActiveWindow
ValidateRect
IsWindowEnabled
ShowWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuState
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
MessageBeep
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
TrackPopupMenu
GetKeyState
SetMenu
CreateWindowExA
GetClassInfoExA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
EqualRect
EnableWindow
SendMessageA
GetSystemMetrics
FindWindowA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
IntersectRect
IsIconic
GetWindowPlacement
GetWindow
LoadStringA
PostMessageA
FillRect
SetWindowPos
GetClassNameA
SetCursor
LoadCursorA
WindowFromPoint
GetParent
ClientToScreen
SetWindowRgn
DrawIconEx
GetSysColor
GetSubMenu
PostThreadMessageA
RegisterClipboardFormatA
IsWindow
SetForegroundWindow
MessageBoxA
GetClassInfoA
PtInRect
CreatePopupMenu
AppendMenuA
SetMenuDefaultItem
GetSystemMenu
GetWindowRect
GetClientRect
InvalidateRect
IsWindowVisible
SetTimer
KillTimer
SetCapture
GetDesktopWindow
LoadIconA
ReleaseCapture
SystemParametersInfoA
SetWindowLongA
GetWindowLongA
ReleaseDC
GetDC
DestroyIcon
EndPaint
BeginPaint
GetCursorPos
SetFocus
UpdateWindow
MoveWindow
GetKeyNameTextA
MapVirtualKeyA
CopyRect
InflateRect
OffsetRect
DrawEdge
GetMenuItemInfoA
GetMenuItemID
GetMenuItemCount
GetNextDlgTabItem
gdi32
CreatePen
GetRgnBox
GetMapMode
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetBkColor
DeleteObject
MoveToEx
LineTo
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateRectRgnIndirect
ExtTextOutA
GetDeviceCaps
SetBkColor
SetTextColor
GetClipBox
CreateRectRgn
RoundRect
GetStockObject
CreateEllipticRgn
PatBlt
Rectangle
GetTextColor
CreateBitmap
GetObjectA
CreateFontA
CreateFontIndirectA
CreateDIBitmap
CreateCompatibleBitmap
BitBlt
CreateSolidBrush
CreateCompatibleDC
SelectObject
DeleteDC
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegQueryValueA
RegEnumKeyA
CryptImportKey
CryptDecrypt
CryptAcquireContextA
CryptDestroyKey
CryptCreateHash
CryptHashData
CryptDeriveKey
CryptDestroyHash
CryptReleaseContext
RegEnumKeyExA
RegDeleteKeyA
RegOpenKeyA
RegCreateKeyA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
shell32
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
SHGetSpecialFolderPathA
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
oledlg
ord8
ole32
CoTaskMemAlloc
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CreateStreamOnHGlobal
CoUninitialize
CoSetProxyBlanket
CoCreateInstance
CoInitializeEx
CoTaskMemFree
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
oleaut32
SystemTimeToVariantTime
VarUdateFromDate
SysAllocString
SysFreeString
VariantClear
VariantInit
SysAllocStringLen
VariantChangeType
SysStringLen
SysAllocStringByteLen
OleCreateFontIndirect
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
urlmon
URLDownloadToFileA
gdiplus
GdipSetImageAttributesColorMatrix
GdipLoadImageFromStreamICM
GdipLoadImageFromStream
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipCreateBitmapFromHBITMAP
GdipDrawImageI
GdipDrawImageRectRectI
GdipDrawCachedBitmap
GdipGetImageGraphicsContext
GdipFree
GdipAlloc
GdipDisposeImage
GdipGetImageWidth
GdipGetImageHeight
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipCloneImage
GdiplusShutdown
GdiplusStartup
GdipDeleteGraphics
GdipCreateCachedBitmap
GdipDeleteCachedBitmap
GdipCreateBitmapFromScan0
GdipCreateHBITMAPFromBitmap
wsock32
WSASetLastError
WSACleanup
WSAStartup
gethostname
gethostbyname
inet_addr
wininet
InternetGetConnectedState
Sections
.text Size: 377KB - Virtual size: 376KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ