Static task
static1
Behavioral task
behavioral1
Sample
d4f93ee3b6b7da191c5cc6a9b8a329d7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d4f93ee3b6b7da191c5cc6a9b8a329d7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4f93ee3b6b7da191c5cc6a9b8a329d7_JaffaCakes118
-
Size
1.5MB
-
MD5
d4f93ee3b6b7da191c5cc6a9b8a329d7
-
SHA1
71940fed30960dae2c28f1107c72320ebc8ee966
-
SHA256
54316cebcb95f8d053783493e599b9e62a33d4b03f182d8eb34a7c6605d14861
-
SHA512
ac20d7f8e882a44c3ea28f4769789886d9e17de1fa997d803110308d2e8a307731a298941376f5b481e69ae7c2ea4f1a518e4f92bc89dfab94ab5a16fc7032b0
-
SSDEEP
24576:JzDpltwCWa6GVQXItzLPopscpcmJIo98KbMQbsCfuPsDIRYXo/Oj5VnqyZ:Dlsa6jc3ojeoIo91jfuku/OlvZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4f93ee3b6b7da191c5cc6a9b8a329d7_JaffaCakes118
Files
-
d4f93ee3b6b7da191c5cc6a9b8a329d7_JaffaCakes118.exe windows:4 windows x86 arch:x86
412414e160557a84b12d8a1178e568b8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetPrivateProfileStructA
WritePrivateProfileStructA
GetCurrentProcess
lstrcpyA
SetPriorityClass
GetShortPathNameA
GetSystemTimeAsFileTime
GlobalUnlock
CreateEventA
lstrcmpA
GlobalReAlloc
SetThreadPriority
MultiByteToWideChar
GetDriveTypeA
GetLogicalDrives
GetSystemTime
GetStartupInfoA
WritePrivateProfileStringA
GetPrivateProfileStringA
Sleep
CreateThread
WaitForSingleObject
CloseHandle
GetModuleFileNameA
FindResourceA
LoadResource
LockResource
MulDiv
GetTickCount
GlobalAlloc
GetFileAttributesA
ExitProcess
CopyFileA
CreateSemaphoreA
GetLastError
ReleaseSemaphore
GetFullPathNameA
FindNextFileA
TerminateThread
MoveFileA
CreateFileA
ReadFile
SetFilePointer
WriteFile
FreeLibrary
lstrcpynA
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FindFirstFileA
FindClose
WideCharToMultiByte
CreateProcessA
lstrcmpiA
DeleteFileA
GetTempPathA
GetTempFileNameA
GetPrivateProfileIntA
SetCurrentDirectoryA
GetCurrentDirectoryA
RemoveDirectoryA
SystemTimeToFileTime
GlobalFree
GetModuleHandleA
user32
LoadCursorA
SetCursor
ClientToScreen
GetUpdateRect
GetCursorPos
EndPaint
GetForegroundWindow
IsWindow
FindWindowA
PostMessageA
SetWindowLongA
SetParent
FindWindowExA
DefWindowProcA
CheckMenuItem
SetWindowTextA
GetWindowDC
ReleaseDC
DestroyWindow
CreateDialogParamA
GetDlgItem
GetWindowRect
SetWindowPos
InvalidateRect
SendMessageA
GetDlgItemTextA
DrawTextA
SetForegroundWindow
ShowWindow
GetParent
TrackPopupMenu
ReleaseCapture
SetCapture
CreateWindowExA
IsWindowVisible
GetWindowLongA
GetClientRect
EnableWindow
LoadImageA
wsprintfA
GetSubMenu
EndDialog
MessageBoxA
GetAsyncKeyState
DispatchMessageA
GetMessageA
GetSystemMetrics
KillTimer
SetFocus
UnregisterClassA
FillRect
EnumDisplaySettingsA
SetRect
SystemParametersInfoA
DestroyCursor
BeginDeferWindowPos
DeferWindowPos
EndDeferWindowPos
SetWindowRgn
wvsprintfA
CheckRadioButton
GetDlgItemInt
DrawIconEx
SetTimer
WindowFromPoint
RegisterClipboardFormatA
SetClassLongA
DialogBoxParamA
LoadBitmapA
IsDlgButtonChecked
CreatePopupMenu
DestroyMenu
PostQuitMessage
UpdateWindow
LoadMenuA
GetSystemMenu
InsertMenuA
InsertMenuItemA
LoadIconA
RegisterClassA
GetClassInfoA
RegisterWindowMessageA
LoadStringA
LoadAcceleratorsA
RemoveMenu
GetClassLongA
IsDialogMessageA
TranslateAcceleratorA
TranslateMessage
CharNextA
SendDlgItemMessageA
PeekMessageA
SetDlgItemTextA
GetDC
GetWindowTextA
RegisterClassExA
CheckDlgButton
SetCursorPos
gdi32
DeleteDC
GetDIBits
SelectObject
CreateCompatibleDC
SetBkMode
SetTextColor
LineTo
MoveToEx
UpdateColors
RealizePalette
SelectPalette
BitBlt
CreateDIBSection
CreatePalette
GetDeviceCaps
CreateBrushIndirect
GetNearestColor
GetTextMetricsA
CreateFontA
CreateCompatibleBitmap
StretchBlt
ExtSelectClipRgn
Rectangle
IntersectClipRect
SetBkColor
GetStockObject
CreatePen
TextOutA
CreateRectRgn
CreatePolyPolygonRgn
GetTextExtentPoint32A
CreateSolidBrush
GetObjectA
RoundRect
GetBkColor
GetTextColor
DeleteObject
GetDIBColorTable
advapi32
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegDeleteValueA
RegSetValueExA
RegDeleteKeyA
RegEnumKeyA
RegEnumKeyExA
RegOpenKeyExA
shell32
ShellExecuteA
SHGetMalloc
DragQueryPoint
DragQueryFileA
DragFinish
SHBrowseForFolderA
SHGetPathFromIDListA
Shell_NotifyIconA
comctl32
ord17
ole32
CoCreateGuid
CoRevokeClassObject
RevokeDragDrop
OleUninitialize
OleInitialize
RegisterDragDrop
CoRegisterClassObject
CoInitialize
CLSIDFromString
CoCreateInstance
comdlg32
GetSaveFileNameA
GetOpenFileNameA
msvcrt
_XcptFilter
_onexit
__dllonexit
__CxxFrameHandler
_purecall
malloc
free
strtol
fwrite
qsort
ceil
__mb_cur_max
_isctype
_pctype
mbstowcs
wcstombs
??2@YAPAXI@Z
sprintf
_except_handler3
toupper
fseek
ftell
realloc
fputc
memset
exit
memcmp
fgets
atoi
??3@YAXPAX@Z
strncpy
strlen
strcmp
strncmp
fprintf
sqrt
sin
pow
strcat
fopen
fread
fclose
strcpy
_mbsstr
memcpy
_CIpow
rand
_ftol
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_stricmp
_controlfp
_strdup
Sections
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CODE Size: 1KB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE