Static task
static1
Behavioral task
behavioral1
Sample
cf8bf561510418d35e6e392dbf255d73_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf8bf561510418d35e6e392dbf255d73_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cf8bf561510418d35e6e392dbf255d73_JaffaCakes118
-
Size
821KB
-
MD5
cf8bf561510418d35e6e392dbf255d73
-
SHA1
30bc19ff4efa12815e91f56a4a0075e8e23ef44b
-
SHA256
12d3f484d7c721dd8ac53d458120e32a1255bae80ba7b91e2e4763e6315964d5
-
SHA512
29a79322624e56c299102c7c8307e3f17b7e6ad901a03498b40cae5481511c958b07402f9ffd27f9a2ee69913aae43140fdf304704903a09b23892cfaf4ebbf3
-
SSDEEP
12288:uRXUWYLS/n99lSB+3Et6UdYPy3HYMLgv/O9Uv7lL7UrH3G4O0FTTYHHQoCz8Pm:YsLoM+U0U663QXO9UCHTYnQoBm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf8bf561510418d35e6e392dbf255d73_JaffaCakes118
Files
-
cf8bf561510418d35e6e392dbf255d73_JaffaCakes118.exe windows:5 windows x86 arch:x86
06293c3215d665708b045735506aca0f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetCloseHandle
HttpOpenRequestW
HttpQueryInfoW
InternetSetOptionW
HttpSendRequestW
InternetConnectW
InternetReadFile
InternetCrackUrlW
InternetOpenW
kernel32
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
GetSystemDefaultLangID
CreateDirectoryW
WaitForSingleObject
GetModuleHandleW
WideCharToMultiByte
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
Sleep
GetVersionExW
GetFileAttributesW
GetModuleFileNameW
MultiByteToWideChar
GetLastError
GetProcAddress
FindClose
GetSystemInfo
GetTimeZoneInformation
FindResourceW
LoadResource
SizeofResource
LockResource
InterlockedIncrement
InterlockedDecrement
GetTickCount
InitializeCriticalSection
TerminateThread
LeaveCriticalSection
InterlockedFlushSList
EnterCriticalSection
InterlockedExchangeAdd
WaitForMultipleObjects
DeleteCriticalSection
CloseHandle
CreateThread
VirtualProtect
VirtualFree
VirtualAlloc
SetThreadPriority
CreateEventW
SetEvent
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
SwitchToThread
SetThreadAffinityMask
GetProcessAffinityMask
DeleteTimerQueueTimer
SetFilePointer
CreateTimerQueue
CreateTimerQueueTimer
ExitThread
DuplicateHandle
SetEnvironmentVariableA
SetEndOfFile
CreateFileW
GetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
WriteConsoleW
SetStdHandle
QueryDepthSList
ChangeTimerQueueTimer
UnregisterWaitEx
GetNumaHighestNodeNumber
RegisterWaitForSingleObject
GetThreadPriority
UnregisterWait
GetTempPathW
SignalObjectAndWait
GetModuleFileNameA
FileTimeToSystemTime
GetDriveTypeW
FindFirstFileExW
FileTimeToLocalFileTime
GetStringTypeW
ReadConsoleW
LCMapStringW
CompareStringW
EnumSystemLocalesW
GetUserDefaultLCID
RaiseException
HeapSize
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetFilePointerEx
ReadFile
IsValidLocale
LoadLibraryW
OutputDebugStringW
LoadLibraryExW
FreeLibrary
InterlockedExchange
HeapFree
HeapAlloc
HeapReAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
AreFileApisANSI
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
GetCommandLineA
GetProcessHeap
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
GetCurrentThread
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
CreateSemaphoreW
GetFileType
MoveFileExW
FreeEnvironmentStringsW
user32
SetTimer
DispatchMessageW
SendMessageW
MessageBoxW
TranslateMessage
GetMessageW
DefWindowProcW
SetWindowTextW
UpdateWindow
CreateWindowExW
ShowWindow
SetWindowLongW
GetWindowLongW
RegisterClassExW
PostQuitMessage
UnregisterClassW
LoadCursorW
SetWindowPos
MoveWindow
EndPaint
FillRect
GetParent
GetClientRect
BeginPaint
GetClassInfoExW
GetCursorPos
GetKeyState
DestroyWindow
SendNotifyMessageW
KillTimer
PostMessageW
GetSystemMetrics
gdi32
CreateSolidBrush
DeleteObject
advapi32
RegCreateKeyExW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegDeleteValueW
shell32
ShellExecuteW
SHGetFolderPathW
ShellExecuteExW
ole32
OleInitialize
OleSetContainedObject
CoCreateInstance
OleUninitialize
oleaut32
SysFreeString
SysAllocStringLen
VariantInit
VariantClear
SysStringLen
shlwapi
PathFileExistsW
urlmon
CoInternetSetFeatureEnabled
UrlMkSetSessionOption
ObtainUserAgentString
UrlMkGetSessionOption
ntdll
RtlUnwind
Sections
.text Size: 567KB - Virtual size: 566KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ