KCCDWafdUUJKIIOFFCVDDS
Static task
static1
Behavioral task
behavioral1
Sample
d2c653d5a1f4c30a1eb9b41f6bb1c765_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d2c653d5a1f4c30a1eb9b41f6bb1c765_JaffaCakes118
-
Size
624KB
-
MD5
d2c653d5a1f4c30a1eb9b41f6bb1c765
-
SHA1
f3659d3cac57810eddd83b6bfd8daac3d18fae0c
-
SHA256
bcd6583897a4d287ec10867aa2a1f5e92d410390c69b0a1b218fd571e72b37e1
-
SHA512
c611be04bfb70f9a94e9064d313405a9903b2026278e2ce89016bb0c300a40f1fe77e22341c497c8d27a138eed267013d7b0838e180d3a0e67d12893e2418c41
-
SSDEEP
12288:lIGeyldceHHy5TXTkiHyKl9tuHiRzD8XkQyg:lIGeylC7jtHFpdDPg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource d2c653d5a1f4c30a1eb9b41f6bb1c765_JaffaCakes118
Files
-
d2c653d5a1f4c30a1eb9b41f6bb1c765_JaffaCakes118.exe windows:4 windows x86 arch:x86
56f1d7c262b0c820351948ee74733a49
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetCancelConnection2A
WNetAddConnection2A
kernel32
WaitNamedPipeA
CreateFileA
FreeConsole
InterlockedIncrement
MulDiv
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
FreeResource
GetVersionExA
lstrcmpW
FreeLibrary
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetCurrentThreadId
GetModuleFileNameW
InterlockedDecrement
GetModuleFileNameA
SetThreadPriority
WaitForSingleObject
SetEvent
InitializeCriticalSection
CreateEventA
lstrcmpA
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThread
GetPrivateProfileIntA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetFileAttributesA
SetFileTime
GetFileTime
GetTempFileNameA
GetFullPathNameA
GetDiskFreeSpaceA
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
GetThreadLocale
FileTimeToSystemTime
SystemTimeToFileTime
GetCurrentDirectoryA
MoveFileA
DeleteFileA
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
FindClose
FindFirstFileA
GetVolumeInformationA
GetShortPathNameA
FileTimeToLocalFileTime
LocalFileTimeToFileTime
SetErrorMode
HeapAlloc
HeapFree
RtlUnwind
HeapReAlloc
VirtualAlloc
ExitThread
CreateThread
RaiseException
GetCommandLineA
GetProcessHeap
GetStartupInfoA
ExitProcess
HeapSize
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
Sleep
ReadFile
SetLastError
GetProcAddress
GetModuleHandleA
LoadLibraryA
WriteFile
FormatMessageA
LocalFree
EnterCriticalSection
LeaveCriticalSection
FindResourceA
LoadResource
LockResource
SizeofResource
ResumeThread
GetStringTypeExA
lstrlenA
lstrcmpiA
CompareStringW
CompareStringA
GetCurrentProcessId
CreateToolhelp32Snapshot
Module32First
Module32Next
CloseHandle
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
SuspendThread
user32
SetDlgItemTextA
IsDialogMessageA
SetWindowTextA
GetWindowThreadProcessId
ValidateRect
TranslateMessage
GetMessageA
InflateRect
GetMenuItemInfoA
DestroyMenu
InvalidateRect
TranslateAcceleratorA
SetMenu
BringWindowToTop
SetRectEmpty
CreatePopupMenu
InsertMenuItemA
LoadAcceleratorsA
ReleaseCapture
SetCursor
ReuseDDElParam
UnpackDDElParam
SetRect
KillTimer
WindowFromPoint
IsZoomed
RedrawWindow
SetCapture
SetCursorPos
DestroyCursor
IsRectEmpty
UnionRect
PostQuitMessage
ShowOwnedPopups
FillRect
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
GetWindowDC
BeginPaint
EndPaint
GetSysColorBrush
UnregisterClassA
SetParent
GetDCEx
LockWindowUpdate
FindWindowA
DestroyIcon
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
TrackPopupMenu
GetKeyState
SetScrollPos
GetScrollPos
IsWindowVisible
GetMenu
PostMessageA
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
GetActiveWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
ReleaseDC
GetDC
CopyRect
IsWindow
GetMenuState
GetMenuStringA
GetMenuItemID
InsertMenuA
GetMenuItemCount
EnableWindow
CharUpperA
SendMessageA
LoadStringA
PtInRect
GetSubMenu
LoadMenuA
ClientToScreen
LoadIconA
GetClientRect
DeleteMenu
GetSystemMenu
SetTimer
UpdateWindow
GetDesktopWindow
ShowWindow
LoadBitmapA
LoadCursorA
SetForegroundWindow
GetCursorPos
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
gdi32
CreatePatternBrush
GetStockObject
CreateSolidBrush
SetRectRgn
CreateRectRgn
SelectClipRgn
CombineRgn
CreateRectRgnIndirect
PatBlt
GetClipBox
SetTextColor
SetBkColor
CreateBitmap
CreateFontIndirectA
CreateCompatibleBitmap
DeleteObject
GetCharWidthA
SelectObject
CreateFontA
DeleteDC
StretchDIBits
GetBkColor
GetTextMetricsA
SaveDC
RestoreDC
SetBkMode
GetObjectA
CreateCompatibleDC
BitBlt
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
ExtTextOutA
SetMapMode
ExcludeClipRect
IntersectClipRect
Escape
TextOutA
RectVisible
PtVisible
GetPixel
GetTextExtentPoint32A
GetDeviceCaps
advapi32
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
SetFileSecurityA
GetFileSecurityA
RegCreateKeyA
OpenSCManagerA
OpenServiceA
CreateServiceA
CloseServiceHandle
StartServiceA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
CryptAcquireContextA
RegSetValueA
shell32
SHGetFileInfoA
DragFinish
DragQueryFileA
ExtractIconA
Shell_NotifyIconA
comctl32
ImageList_Destroy
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
ws2_32
WSACleanup
WSAStartup
oleacc
CreateStdAccessibleObject
LresultFromObject
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comdlg32
GetFileTitleA
oleaut32
VariantInit
SysAllocStringLen
VariantChangeType
VariantClear
Exports
Exports
Sections
.text Size: 284KB - Virtual size: 280KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 240KB - Virtual size: 239KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ