Static task
static1
Behavioral task
behavioral1
Sample
d29701f2f48fa2988ef989dc7ce1417a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d29701f2f48fa2988ef989dc7ce1417a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d29701f2f48fa2988ef989dc7ce1417a_JaffaCakes118
-
Size
954KB
-
MD5
d29701f2f48fa2988ef989dc7ce1417a
-
SHA1
62e8278423ca7ee633f6e03d2ec7720525c84422
-
SHA256
fedd03059e4b4bdfeac1fac350aef027caf877b8a78140e978b21bad6b23947d
-
SHA512
b0246e44e8529a26abe35111cae4677a2a832b4ae3f5043aab07238699820a4a2f6f0e2168707373b3a4a99a43205c113f410acfc41858b3bdd34bf9dab72f87
-
SSDEEP
12288:6+QTNW2aMPFtbsLUnfXDqJXuGDxDKLvZ0BteR0fZJbZbukRZZEelqGsNg/SAKWkE:sTfbAicrlDKLBW/fXtu2ZGmWNg/R7Fh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d29701f2f48fa2988ef989dc7ce1417a_JaffaCakes118
Files
-
d29701f2f48fa2988ef989dc7ce1417a_JaffaCakes118.exe windows:5 windows x86 arch:x86
8e4ae0afbd7384a7b12924a722255e78
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
MoveToEx
CreateCompatibleDC
BitBlt
SelectObject
LineTo
DPtoLP
SetTextColor
CreateSolidBrush
GetTextFaceA
Polyline
StretchBlt
GetTextMetricsA
CreateFontA
CreateBitmap
TextOutA
ExtTextOutA
SetBkColor
GetMapMode
CreatePen
SetMapMode
Polygon
GetTextExtentPoint32A
CreateCompatibleBitmap
CreatePatternBrush
GetObjectA
DeleteObject
Rectangle
GetPixel
DeleteDC
GetDeviceCaps
SetPixel
kernel32
LocalFree
IsDBCSLeadByte
CreateFileW
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetCompressedFileSizeA
ExpandEnvironmentStringsA
FindFirstFileW
InterlockedIncrement
GetStringTypeW
GetProcAddress
lstrcmpiA
GlobalSize
GetFullPathNameA
GetCurrentDirectoryW
InterlockedDecrement
FileTimeToSystemTime
CompareFileTime
MultiByteToWideChar
GetFileType
BeginUpdateResourceA
GetEnvironmentStrings
MapViewOfFile
GetConsoleOutputCP
TlsGetValue
WideCharToMultiByte
LCMapStringW
SystemTimeToFileTime
GetModuleFileNameA
UnmapViewOfFile
IsDebuggerPresent
CompareStringA
SetFilePointer
GetLastError
ReadFile
GetStdHandle
WriteFile
SetPriorityClass
ResetEvent
UnhandledExceptionFilter
FlushFileBuffers
GetLogicalDrives
VirtualAlloc
GetSystemTimeAsFileTime
CreateFileA
ExitProcess
LocalFileTimeToFileTime
LoadLibraryExA
SetThreadPriority
GetLocaleInfoA
GetProfileStringA
RemoveDirectoryA
GlobalFree
GetFileAttributesA
SetCurrentDirectoryW
FindFirstChangeNotificationA
TlsSetValue
GetVersionExA
CreateFileMappingA
FindClose
RaiseException
GetProcessHeap
lstrcpyA
GetPrivateProfileStringA
DosDateTimeToFileTime
SetCurrentDirectoryA
GetCPInfo
LCMapStringA
FindFirstFileA
WritePrivateProfileStringA
EnterCriticalSection
GetStartupInfoA
QueryPerformanceCounter
LeaveCriticalSection
FindNextChangeNotification
ExitThread
GetCurrentProcess
MulDiv
CreateThread
DeleteCriticalSection
GetLocalTime
HeapReAlloc
TerminateProcess
GetOEMCP
TlsFree
GetStringTypeA
DeleteFileA
Sleep
FreeEnvironmentStringsA
SetUnhandledExceptionFilter
HeapSize
GetDiskFreeSpaceA
GetLogicalDriveStringsA
GetEnvironmentStringsW
WaitForMultipleObjects
GlobalMemoryStatus
CreateEventA
CompareStringW
GetFileAttributesW
ReleaseMutex
GetCurrentThreadId
ExpandEnvironmentStringsW
GetCommandLineW
CreateMutexA
SetLastError
TlsAlloc
FileTimeToDosDateTime
MoveFileW
DeleteFileW
EndUpdateResourceA
SetEndOfFile
SetHandleCount
HeapCreate
CloseHandle
SetFileAttributesW
GetModuleHandleW
SetFileAttributesA
HeapAlloc
UpdateResourceA
GetTickCount
GetFileTime
GetNumberFormatA
GetCurrentDirectoryA
HeapFree
GetCurrentProcessId
FormatMessageA
CopyFileA
WriteConsoleA
MoveFileA
ResumeThread
LoadLibraryA
SetStdHandle
FindNextFileW
CreateDirectoryA
GetDateFormatA
RtlUnwind
GlobalLock
GetSystemTime
SetErrorMode
VirtualFree
GetPrivateProfileIntA
GetTimeFormatA
GetCommandLineA
SuspendThread
BackupRead
WriteConsoleW
GetTempPathA
GlobalAlloc
GetProcessAffinityMask
DeviceIoControl
WaitForSingleObject
IsValidCodePage
GetConsoleCP
GetDriveTypeA
FindResourceA
FreeLibrary
GetACP
SetFileTime
FindCloseChangeNotification
GetPriorityClass
CreateDirectoryW
FileTimeToLocalFileTime
GetThreadPriority
SetEvent
GetCurrentThread
EnumResourceNamesA
FindNextFileA
GlobalUnlock
SizeofResource
lstrlenA
SetEnvironmentVariableA
GetModuleHandleA
OpenFileMappingA
FreeEnvironmentStringsW
LoadResource
GetFullPathNameW
EnumResourceLanguagesA
RemoveDirectoryW
GetVersion
BackupSeek
advapi32
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
GetFileSecurityA
RegDeleteKeyA
OpenProcessToken
RegOpenKeyExA
RegSetValueExW
RegEnumKeyExA
SetFileSecurityW
RegEnumValueA
SetFileSecurityA
GetFileSecurityW
GetSecurityDescriptorLength
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueExW
RegDeleteValueA
user32
ScrollWindowEx
EndPaint
BringWindowToTop
InvalidateRect
SetFocus
CallWindowProcA
FindWindowExA
EnumWindows
GetMenuItemCount
CreateWindowExA
SetWindowTextW
GetSysColor
InsertMenuA
EnumChildWindows
GetDesktopWindow
IsDialogMessageA
GetClassNameA
GetMenu
IsWindow
PtInRect
GetSubMenu
CopyImage
RegisterClipboardFormatA
EnableWindow
TrackPopupMenu
EmptyClipboard
SetWindowLongA
RegisterClassA
CheckMenuItem
CreateIcon
SetMenuItemInfoA
MessageBoxA
FillRect
SetDlgItemInt
CharUpperA
SetClipboardData
LoadStringA
GetWindowRect
MapWindowPoints
WindowFromPoint
IsIconic
GetWindowTextLengthA
GetMenuItemID
CloseClipboard
LoadCursorA
IsCharUpperW
SetScrollPos
ReleaseDC
DispatchMessageA
IsWindowVisible
GetLastActivePopup
SetPropA
AppendMenuW
RegisterWindowMessageA
InsertMenuItemA
GetMenuState
ClientToScreen
GetClientRect
UpdateWindow
DialogBoxParamA
SendDlgItemMessageA
SetScrollRange
GetSystemMenu
IsCharAlphaW
SetTimer
IntersectRect
FlashWindow
IsCharAlphaA
LoadAcceleratorsA
EnableMenuItem
GetDlgItemInt
SetDlgItemTextW
GetWindowTextA
GetDlgItemTextA
CharUpperW
CreateIconIndirect
RedrawWindow
PostMessageA
LoadBitmapA
SetCursor
PostThreadMessageA
MessageBeep
GetDC
SetMenu
SetWindowTextA
CopyIcon
SetWindowPos
AppendMenuA
ScreenToClient
EndDialog
CreateDialogParamA
PostQuitMessage
IsWindowEnabled
FindWindowA
DestroyIcon
GetWindowPlacement
DestroyWindow
CreateDialogIndirectParamA
OemToCharBuffA
GetWindowLongA
PeekMessageA
TranslateMessage
GetDialogBaseUnits
IsCharUpperA
LoadImageA
SetWindowPlacement
GetKeyState
CharToOemBuffA
GetDlgItem
GetMenuItemInfoA
GetMessageA
DestroyMenu
ShowWindow
GetWindowTextW
IsChild
CharLowerA
CharLowerW
IsDlgButtonChecked
DefWindowProcA
DeleteMenu
GetWindowThreadProcessId
GetClipboardData
CharToOemA
GetPropA
GetCursorPos
ValidateRect
CheckDlgButton
GetWindow
DrawMenuBar
DrawIconEx
LoadIconA
ExitWindowsEx
RemovePropA
OemToCharA
BeginPaint
OpenClipboard
SendMessageW
SendMessageA
GetSystemMetrics
MoveWindow
GetIconInfo
SetForegroundWindow
GetParent
CreatePopupMenu
GetFocus
LoadMenuA
SetDlgItemTextA
TranslateAcceleratorA
KillTimer
comdlg32
GetOpenFileNameA
GetSaveFileNameA
ChooseFontA
CommDlgExtendedError
GetOpenFileNameW
comctl32
ImageList_ReplaceIcon
PropertySheetA
ImageList_Remove
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
ImageList_Add
shell32
SHChangeNotify
Shell_NotifyIconA
SHGetDesktopFolder
SHGetSpecialFolderLocation
ShellExecuteExA
SHFileOperationA
SHGetMalloc
DragQueryFileW
DragQueryFileA
DragAcceptFiles
DragFinish
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
FindExecutableA
ExtractIconExA
ole32
OleInitialize
CoCreateInstance
DoDragDrop
OleUninitialize
OleSetClipboard
msvfw32
DrawDibSetPalette
ICRemove
Sections
.text Size: 516KB - Virtual size: 515KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 405KB - Virtual size: 3.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ