Static task
static1
Behavioral task
behavioral1
Sample
d3e33e6d98ff641eb5a0e180ad393c0a_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d3e33e6d98ff641eb5a0e180ad393c0a_JaffaCakes118
-
Size
1.3MB
-
MD5
d3e33e6d98ff641eb5a0e180ad393c0a
-
SHA1
10598908147d5478fce784ea13456875ca55c9e6
-
SHA256
21502722a3e4e6f079705fcb2e04af63f2f70d695431627f8dd6fbe7fcffcf90
-
SHA512
06f2184d78e8ac22bc762670cba417cb55e27044c3631490ac1690b0ce1b9e849cd8f0a740ac2176c0830dd5999d5c677433757fc2d91a0c239661c367cee8cf
-
SSDEEP
24576:s9vmVFjEn/Xm2NZDYkNdwB5TmQA3bkOq01PG6R8HTJqh8qh:szu2NlA8Heqaq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3e33e6d98ff641eb5a0e180ad393c0a_JaffaCakes118
Files
-
d3e33e6d98ff641eb5a0e180ad393c0a_JaffaCakes118.exe windows:4 windows x86 arch:x86
53da04ffc1bbb0ce4e660199d641e22f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
GetPrivateProfileSectionNamesA
InterlockedExchange
GetVersion
CompareStringA
CompareStringW
GetLocaleInfoA
GetThreadLocale
HeapFree
GetProcessHeap
HeapAlloc
AreFileApisANSI
GetSystemTime
GetFullPathNameW
DeleteFileW
LockFileEx
GetTempPathW
GetFileAttributesW
LoadLibraryW
LockFile
UnlockFile
SetEnvironmentVariableA
CreateFileW
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetConsoleMode
CreateToolhelp32Snapshot
GetFileType
SetHandleCount
GetTimeZoneInformation
HeapCreate
GetStdHandle
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetCPInfo
LCMapStringW
LCMapStringA
GetStartupInfoA
GetCommandLineA
VirtualQuery
GetSystemInfo
VirtualProtect
GetSystemTimeAsFileTime
RtlUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedCompareExchange
HeapSize
HeapReAlloc
HeapDestroy
GetACP
GetVolumeInformationA
GetPrivateProfileIntA
GetFileSize
CreateFileMappingA
MapViewOfFileEx
SetEndOfFile
SetFilePointer
UnmapViewOfFile
ResetEvent
Process32First
Process32Next
GetEnvironmentVariableA
CopyFileA
CreateProcessA
GetExitCodeProcess
LoadLibraryExA
IsDBCSLeadByte
lstrcmpiA
InterlockedIncrement
lstrlenW
CreateDirectoryA
ReadFile
CreateNamedPipeA
ConnectNamedPipe
GetTickCount
GetCurrentProcessId
GetProcAddress
ExitProcess
LoadLibraryA
FreeLibrary
GetVersionExA
CreateFileA
WriteFile
FlushFileBuffers
InterlockedDecrement
GetModuleHandleA
lstrcatA
FormatMessageA
FreeResource
MulDiv
GetTempPathA
CreateMutexA
GetFileAttributesA
lstrcmpA
FindNextFileA
CreateThread
CreateTimerQueue
CreateTimerQueueTimer
DeleteFileA
DeleteTimerQueueEx
GetPrivateProfileStructA
WritePrivateProfileStringA
WritePrivateProfileStructA
FindFirstFileA
GetFullPathNameA
FindClose
DeleteCriticalSection
InitializeCriticalSection
CloseHandle
SetEvent
WaitForSingleObject
CreateEventA
ExitThread
SetLastError
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
Sleep
GetLastError
RaiseException
lstrcpyA
GlobalLock
lstrcpynA
GetCurrentProcess
FlushInstructionCache
MultiByteToWideChar
lstrlenA
GetModuleFileNameA
GetPrivateProfileStringA
GetDateFormatA
GetTimeFormatA
WideCharToMultiByte
FindResourceExA
FindResourceA
LoadResource
LockResource
GetConsoleCP
SizeofResource
user32
DrawStateA
DrawIconEx
GetFocus
GetMenuItemID
GetWindowThreadProcessId
SetFocus
RegisterClipboardFormatA
SetWindowsHookExA
UnhookWindowsHookEx
CreateDialogParamA
LoadIconA
GetClassNameA
SetRectEmpty
CallNextHookEx
GetDCEx
FrameRect
OffsetRect
SetRect
CharLowerA
CharNextA
IsMenu
CreateIconIndirect
IsRectEmpty
IntersectRect
SetCursor
EndDialog
GetPropA
UnregisterClassA
PostThreadMessageA
EnableScrollBar
GetScrollInfo
GetScrollPos
SetScrollPos
ShowScrollBar
RemovePropA
SetPropA
SetScrollInfo
GetWindowLongA
GetParent
GetIconInfo
MessageBeep
GetSysColorBrush
WindowFromPoint
GetMessagePos
DestroyIcon
PeekMessageA
RegisterWindowMessageA
InflateRect
PostMessageA
GetSysColor
GetSubMenu
LoadMenuA
ModifyMenuA
TrackPopupMenuEx
MonitorFromPoint
GetMonitorInfoA
DestroyCursor
SetMenuItemInfoA
GetMenuItemInfoA
GetMenuItemCount
CopyRect
DrawEdge
WindowFromDC
DrawFrameControl
SetWindowPos
MapWindowPoints
GetClientRect
SystemParametersInfoA
GetWindowRect
GetWindow
SetWindowLongA
CreateWindowExA
SetWindowTextA
SendMessageA
GetMenu
MoveWindow
SetDlgItemTextA
GetDlgItem
OpenClipboard
IsDialogMessageA
AdjustWindowRectEx
IsWindowVisible
DestroyMenu
DialogBoxParamA
MessageBoxA
PtInRect
ReleaseCapture
GetCapture
GetDlgCtrlID
IsWindowEnabled
KillTimer
SetTimer
UpdateWindow
ClientToScreen
LoadStringA
LoadCursorA
GetClassInfoExA
SetForegroundWindow
LoadImageA
GetSystemMenu
EnableMenuItem
ScreenToClient
FillRect
ValidateRect
CallWindowProcA
EnableWindow
InvalidateRect
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
RegisterClassExA
DefWindowProcA
BeginPaint
EndPaint
GetKeyState
GetWindowDC
GetCursorPos
SetCapture
GetDC
ReleaseDC
PostQuitMessage
DestroyWindow
RedrawWindow
DrawTextA
GetSystemMetrics
GetActiveWindow
IsClipboardFormatAvailable
GetClipboardData
CloseClipboard
GetWindowTextLengthA
GetWindowTextA
SetWindowRgn
LoadBitmapA
IsWindow
gdi32
StretchBlt
CreateDIBSection
GetDeviceCaps
GetTextExtentPoint32A
GetCurrentObject
SaveDC
RestoreDC
SetViewportOrgEx
Polygon
SetPixel
GetPixel
CreateSolidBrush
TextOutW
SetStretchBltMode
GetClipBox
UnrealizeObject
PatBlt
SetBrushOrgEx
PlayEnhMetaFile
SetWindowOrgEx
IntersectClipRect
GetBitmapDimensionEx
SetBkColor
ExtTextOutA
MoveToEx
LineTo
CreatePatternBrush
CreatePen
RoundRect
Rectangle
CreateEllipticRgn
CombineRgn
GetDIBits
CreateCompatibleBitmap
GetStockObject
DeleteObject
CreateRoundRectRgn
GetObjectA
CreateFontA
DeleteDC
CreateFontIndirectA
SetTextColor
SetBkMode
BitBlt
SelectObject
CreateCompatibleDC
SelectClipRgn
CreateBitmap
CreateRectRgn
GetClipRgn
advapi32
RegQueryValueExA
RegFlushKey
RegOpenKeyExA
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumKeyExA
RegOpenKeyA
GetUserNameA
RegCloseKey
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ord165
Shell_NotifyIconA
SHGetFolderPathA
SHGetPathFromIDListA
SHBrowseForFolderA
ole32
CoTaskMemAlloc
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoInitialize
CoTaskMemRealloc
oleaut32
SysAllocString
VarUI4FromStr
SysAllocStringLen
SysStringByteLen
SysAllocStringByteLen
VariantClear
VariantInit
SysFreeString
iphlpapi
GetAdaptersInfo
shlwapi
PathAppendA
PathAddBackslashA
PathAddExtensionA
PathFindFileNameA
StrCmpNA
PathRemoveFileSpecA
StrCpyW
comctl32
ImageList_GetIconSize
ImageList_Create
ImageList_Destroy
ImageList_AddMasked
ImageList_Draw
ImageList_Add
_TrackMouseEvent
ImageList_GetImageCount
ImageList_DrawIndirect
InitCommonControlsEx
ord8
ImageList_GetIcon
ImageList_DrawEx
msimg32
TransparentBlt
GradientFill
AlphaBlend
uxtheme
CloseThemeData
OpenThemeData
DrawThemeBackground
wininet
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
InternetConnectA
InternetOpenA
InternetGetCookieA
InternetCrackUrlA
HttpAddRequestHeadersA
InternetSetOptionA
InternetOpenUrlA
Sections
.text Size: 673KB - Virtual size: 672KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 581KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ