Static task
static1
Behavioral task
behavioral1
Sample
d22519de160f950316a002cb3e9d3ac8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d22519de160f950316a002cb3e9d3ac8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d22519de160f950316a002cb3e9d3ac8_JaffaCakes118
-
Size
477KB
-
MD5
d22519de160f950316a002cb3e9d3ac8
-
SHA1
7b831cd2158f833bf6cf905e3ffa26a9dd8e93c4
-
SHA256
38bc320ce3964be59f8fabc044aad696e3d21462317bc6c949b5e74d392becae
-
SHA512
448f606bff483bbc85042b9f287d29c0fd24cbbde7d6d5d0cc11a4e126b6e7da5a36b5df37e8f29e78b663827c02104b7ea3e8acbbcfcb5a289976fe2b9de9a9
-
SSDEEP
12288:dNIQAPGsAqY9IMVYd38sJdpQHlGlY8KfTXeY:aPGSY91VwNJcFMqTh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d22519de160f950316a002cb3e9d3ac8_JaffaCakes118
Files
-
d22519de160f950316a002cb3e9d3ac8_JaffaCakes118.exe windows:4 windows x86 arch:x86
8cb987c79d5402d49bbd4392cc7a1ada
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSAStartup
gethostname
gethostbyname
inet_addr
WSACleanup
winmm
mixerSetControlDetails
joyGetPosEx
mciSendStringA
joyGetDevCapsA
waveOutGetVolume
mixerGetLineControlsA
mixerGetControlDetailsA
mixerGetLineInfoA
mixerOpen
mixerGetDevCapsA
mixerClose
waveOutSetVolume
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
comctl32
ord6
ImageList_AddMasked
ord17
ImageList_GetIconSize
ImageList_Create
ImageList_Destroy
ImageList_ReplaceIcon
kernel32
Beep
MultiByteToWideChar
SetEnvironmentVariableA
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
CreateProcessA
MulDiv
ReadFile
GetFileSize
CreateFileA
GetEnvironmentVariableA
DeviceIoControl
GetFileAttributesA
CreateDirectoryA
WriteFile
GlobalSize
GetDateFormatA
GetLocalTime
GetSystemTime
GetComputerNameA
GetWindowsDirectoryA
GetTempPathA
GetFullPathNameA
GetShortPathNameA
SetLastError
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
GetExitCodeProcess
ReadProcessMemory
WriteProcessMemory
TerminateProcess
SetPriorityClass
MoveFileA
GetCurrentProcessId
GetTimeFormatA
GetDiskFreeSpaceA
SetErrorMode
SetVolumeLabelA
GetVolumeInformationA
GetDriveTypeA
DeleteFileA
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
FreeLibrary
LoadLibraryA
CompareStringA
RemoveDirectoryA
CopyFileA
GetCurrentProcess
GetPrivateProfileStringA
WritePrivateProfileStringA
FormatMessageA
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
SystemTimeToFileTime
FileTimeToSystemTime
GetStartupInfoA
HeapSize
HeapFree
HeapReAlloc
ExitProcess
HeapAlloc
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
OutputDebugStringA
FindFirstFileA
FindNextFileA
FindClose
GetModuleFileNameA
DeleteCriticalSection
GetVersionExA
CreateThread
SetThreadPriority
GetExitCodeThread
CloseHandle
CreateMutexA
GetLastError
lstrcmpiA
GetCurrentThreadId
GlobalUnlock
GlobalAlloc
GlobalLock
GlobalFree
InitializeCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetCurrentDirectoryA
GetModuleHandleA
GetProcAddress
Sleep
SetCurrentDirectoryA
GetTickCount
LCMapStringA
LCMapStringW
RtlUnwind
InterlockedExchange
VirtualQuery
GetACP
GetOEMCP
GetCPInfo
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetFilePointer
GetCommandLineA
GetStringTypeA
GetStringTypeW
FlushFileBuffers
GetLocaleInfoA
VirtualProtect
GetSystemInfo
SetStdHandle
QueryPerformanceCounter
OpenProcess
SetEndOfFile
user32
SetWindowTextA
IsWindowVisible
GetWindowRect
GetQueueStatus
SetWindowRgn
SetForegroundWindow
IsIconic
GetWindowTextLengthA
GetDlgItem
MessageBeep
EnumClipboardFormats
ClientToScreen
GetCaretPos
GetCursor
MoveWindow
SetActiveWindow
EnumChildWindows
SetFocus
EnableWindow
InvalidateRect
SetWindowPos
EnumWindows
ReleaseDC
GetDC
GetIconInfo
SetDlgItemTextA
SendDlgItemMessageA
IsZoomed
DefWindowProcA
FillRect
GetSysColorBrush
GetSysColor
RegisterWindowMessageA
DialogBoxParamA
GetMenuStringA
GetSubMenu
GetMenuItemID
GetMenuItemCount
IsWindowEnabled
ExitWindowsEx
RedrawWindow
CallWindowProcA
CheckRadioButton
MapWindowPoints
PtInRect
SetMenu
UpdateWindow
IntersectRect
DefDlgProcA
GetClassLongA
GetMessagePos
FlashWindow
SetMenuDefaultItem
AppendMenuA
DestroyMenu
IsMenu
RemoveMenu
SetMenuItemInfoA
CreatePopupMenu
CreateMenu
SetRect
GetDesktopWindow
GetMenu
DrawIconEx
GetWindow
GetTopWindow
BringWindowToTop
LoadImageA
EnableMenuItem
DestroyWindow
DestroyIcon
ChangeClipboardChain
IsCharAlphaA
AttachThreadInput
WindowFromPoint
GetSystemMetrics
mouse_event
GetKeyNameTextA
GetAsyncKeyState
GetCursorPos
MapVirtualKeyA
VkKeyScanExA
GetKeyboardState
SetKeyboardState
GetWindowTextA
PostQuitMessage
CharUpperA
UnregisterHotKey
RegisterHotKey
SetWindowsHookExA
UnhookWindowsHookEx
PostThreadMessageA
CallNextHookEx
GetKeyboardLayout
ToAsciiEx
CharLowerA
IsCharAlphaNumericA
IsCharLowerA
IsCharUpperA
EmptyClipboard
SetClipboardData
OpenClipboard
GetClipboardFormatNameA
GetClipboardData
CloseClipboard
FindWindowA
PostMessageA
SetTimer
GetMessageA
GetFocus
GetForegroundWindow
GetWindowThreadProcessId
GetClassNameA
PeekMessageA
GetKeyState
GetWindowLongA
SendMessageA
IsDialogMessageA
ShowWindow
CountClipboardFormats
DrawTextA
AdjustWindowRectEx
SystemParametersInfoA
GetClientRect
MessageBoxA
SendMessageTimeoutA
LoadCursorA
RegisterClassExA
CreateWindowExA
LoadAcceleratorsA
TrackPopupMenuEx
SetClipboardViewer
ScreenToClient
SetWindowLongA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
CopyImage
CheckMenuItem
IsWindow
EndDialog
KillTimer
GetDlgCtrlID
GetParent
IsClipboardFormatAvailable
keybd_event
gdi32
ExcludeClipRect
GetClipRgn
FillRgn
SetTextColor
SetBkColor
SetBkMode
GetObjectA
EnumFontFamiliesExA
GetClipBox
CreateCompatibleBitmap
BitBlt
GetPixel
CreateCompatibleDC
GetDIBits
GetSystemPaletteEntries
CreateEllipticRgn
CreateRoundRectRgn
CreateRectRgn
CreatePolygonRgn
CreateSolidBrush
CreateDCA
GetDeviceCaps
GetStockObject
SelectObject
GetTextFaceA
GetTextMetricsA
CreateFontA
DeleteObject
DeleteDC
comdlg32
GetOpenFileNameA
GetSaveFileNameA
advapi32
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenSCManagerA
LockServiceDatabase
UnlockServiceDatabase
CloseServiceHandle
GetUserNameA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumValueA
RegEnumKeyExA
RegCloseKey
RegConnectRegistryA
shell32
DragQueryPoint
SHFileOperationA
SHGetMalloc
SHGetDesktopFolder
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteExA
Shell_NotifyIconA
DragQueryFileA
DragFinish
ExtractIconA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
CreateStreamOnHGlobal
oleaut32
OleLoadPicture
Sections
.text Size: 354KB - Virtual size: 353KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ