Static task
static1
Behavioral task
behavioral1
Sample
d57a90f5855e8b13b6b45f39532f0eaa_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d57a90f5855e8b13b6b45f39532f0eaa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d57a90f5855e8b13b6b45f39532f0eaa_JaffaCakes118
-
Size
860KB
-
MD5
d57a90f5855e8b13b6b45f39532f0eaa
-
SHA1
a45fdc543015ce20b86f8d298e458c6748607a86
-
SHA256
d055cbb69790f31beefcead105fca10d3cf2affc087e9a9198deff8de5a28af7
-
SHA512
71ea26baa0eadee7d0cff5822ff0c2fb1474bba076b1d08d2f734b6b3aab45b00019a4ce6905394f9c39610550f302c82aeca37d6cab2a0b270807b2852166ac
-
SSDEEP
12288:WoPIalh/iXqPOhkcv764CmGiukBvUdWbJvIUuiOS+RfDWC9MZTRe+9fapUulgJxC:Ealh/i622n8cmJ69skZ+LV6h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d57a90f5855e8b13b6b45f39532f0eaa_JaffaCakes118
Files
-
d57a90f5855e8b13b6b45f39532f0eaa_JaffaCakes118.exe windows:4 windows x86 arch:x86
1ceb1df919c2799fde1db2360bc3be09
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord6880
ord2864
ord3619
ord2859
ord2860
ord2580
ord4400
ord3630
ord682
ord3693
ord2380
ord5875
ord5788
ord5787
ord4277
ord5572
ord5651
ord3616
ord3127
ord350
ord354
ord5442
ord1979
ord3318
ord665
ord5186
ord6569
ord6930
ord542
ord5933
ord1945
ord4589
ord4588
ord4899
ord4370
ord4892
ord5076
ord4341
ord4349
ord4723
ord4890
ord4531
ord4545
ord4543
ord4526
ord4529
ord4524
ord4964
ord4961
ord4108
ord5240
ord3748
ord1726
ord5260
ord4432
ord813
ord560
ord4273
ord6172
ord5873
ord2575
ord4396
ord3574
ord609
ord556
ord809
ord1088
ord2122
ord1146
ord1168
ord3721
ord795
ord5600
ord1601
ord4202
ord1083
ord941
ord2763
ord5683
ord920
ord938
ord3337
ord3811
ord1848
ord4243
ord6215
ord6007
ord3286
ord6762
ord4694
ord5148
ord4224
ord3797
ord2135
ord818
ord1572
ord2688
ord1140
ord1929
ord825
ord4297
ord472
ord2301
ord6157
ord6380
ord686
ord2862
ord2096
ord384
ord465
ord850
ord464
ord3317
ord1228
ord539
ord802
ord1085
ord3706
ord5786
ord4274
ord6375
ord4486
ord3573
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5714
ord4622
ord3738
ord815
ord561
ord2621
ord6438
ord1134
ord713
ord1232
ord5289
ord2725
ord3876
ord414
ord4160
ord2863
ord6358
ord1567
ord5583
ord268
ord2086
ord5859
ord6141
ord2639
ord5621
ord2077
ord3055
ord928
ord834
ord5934
ord1949
ord4034
ord6385
ord1200
ord798
ord1997
ord5465
ord5194
ord533
ord2393
ord6407
ord6010
ord5466
ord613
ord289
ord1105
ord3719
ord3742
ord793
ord2114
ord2089
ord668
ord1980
ord3181
ord3178
ord4058
ord2781
ord2770
ord356
ord2029
ord2915
ord3874
ord5981
ord6663
ord5953
ord4275
ord324
ord567
ord641
ord693
ord3597
ord4425
ord4627
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord1576
ord2514
ord4998
ord4853
ord4376
ord616
ord3582
ord4398
ord2578
ord4218
ord2023
ord2411
ord4919
ord4411
ord605
ord278
ord3570
ord966
ord1971
ord5478
ord5796
ord4975
ord4863
ord4335
ord4447
ord2031
ord5481
ord5810
ord3810
ord3758
ord3408
ord3227
ord3054
ord3425
ord3880
ord4204
ord2764
ord501
ord773
ord5601
ord3097
ord6134
ord6136
ord781
ord3708
ord4278
ord2642
ord6334
ord3092
ord3089
ord2370
ord2289
ord656
ord3610
ord3402
ord6282
ord6283
ord536
ord4203
ord6662
ord4129
ord5710
ord922
ord939
ord823
ord6888
ord3998
ord6907
ord3301
ord6877
ord926
ord924
ord1175
ord858
ord860
ord800
ord535
ord540
ord2818
ord4299
ord6199
ord4284
ord6696
ord6242
ord3996
ord6453
ord470
ord755
ord2379
ord323
ord1640
ord5785
ord640
ord4476
ord5280
ord537
ord1641
ord6197
ord4710
ord4234
ord2302
ord2414
ord3663
ord2554
ord3626
ord5265
ord3640
ord4424
ord3370
ord5290
ord4402
ord1776
ord6055
ord2582
ord4133
ord3571
msvcrt
__p__commode
sprintf
_access
srand
_mbscmp
atoi
_setmbcp
__CxxFrameHandler
rand
_ftol
free
malloc
_splitpath
_strlwr
_strdup
strncpy
strtok
strstr
_stricmp
_mbsicmp
_CIpow
_beginthreadex
_mbsinc
_mbschr
fclose
fopen
fwrite
modf
time
_CxxThrowException
atol
_except_handler3
?terminate@@YAXXZ
__dllonexit
_onexit
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__fmode
__set_app_type
_controlfp
kernel32
GetProcessHeap
GlobalMemoryStatusEx
GetSystemTime
GetFileSize
WriteFile
LocalAlloc
CreateFileMappingA
OpenFileMappingA
LocalFree
MapViewOfFile
VirtualQuery
UnmapViewOfFile
SetLastError
ReleaseMutex
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetSystemDirectoryA
lstrcpynA
GetModuleHandleA
GetSystemInfo
Module32First
GetExitCodeThread
WaitForSingleObject
GetVersionExA
FindResourceA
LoadResource
SizeofResource
LockResource
lstrcmpA
GetCurrentProcessId
GetLocalTime
SetLocalTime
SetUnhandledExceptionFilter
CreateMutexA
ExitProcess
ResetEvent
WaitForMultipleObjects
CreateEventA
SetEvent
GetCurrentThreadId
WinExec
SetFilePointer
ReadFile
OpenProcess
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
VirtualFreeEx
FindFirstFileA
RemoveDirectoryA
FindNextFileA
FindClose
GetFileAttributesA
CopyFileA
GetWindowsDirectoryA
GetTickCount
WritePrivateProfileStringA
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
lstrlenA
CreateToolhelp32Snapshot
Process32First
Process32Next
MulDiv
CreateDirectoryA
lstrcmpiA
GetPrivateProfileStringA
SetFileAttributesA
Sleep
LoadLibraryA
GetProcAddress
GetLogicalDriveStringsA
QueryDosDeviceA
GetDiskFreeSpaceExA
lstrcpyA
GetDriveTypeA
GetLastError
DeviceIoControl
CreateFileA
CloseHandle
GetPrivateProfileIntA
DeleteFileA
TryEnterCriticalSection
VirtualAlloc
VirtualFree
FreeLibrary
GetStartupInfoA
user32
IsIconic
SystemParametersInfoA
GetSystemMenu
AppendMenuA
LoadIconA
GetWindowLongA
GetAsyncKeyState
GetClassInfoA
ChangeDisplaySettingsA
GetFocus
MessageBeep
SetWindowPos
ClipCursor
GetForegroundWindow
IsWindowVisible
AttachThreadInput
BringWindowToTop
ReleaseDC
wvsprintfA
FillRect
MessageBoxA
SetForegroundWindow
UnionRect
GetWindow
GetClassNameA
SetActiveWindow
PtInRect
GetCursorPos
SetWindowLongA
GetWindowThreadProcessId
FindWindowExA
EnumWindows
GetWindowTextA
FindWindowA
ShowWindow
ExitWindowsEx
UpdateWindow
GetSysColor
IsWindow
SendMessageTimeoutA
PostQuitMessage
MoveWindow
GetDesktopWindow
GetAncestor
GetNextDlgTabItem
LoadCursorA
SetCursor
CopyRect
ScreenToClient
wsprintfA
GetWindowRect
SetWindowRgn
GetParent
SendMessageA
GetClientRect
RedrawWindow
EnableWindow
SetTimer
GetSystemMetrics
KillTimer
InvalidateRect
GetDlgCtrlID
PostMessageA
gdi32
CreateDIBitmap
ExtCreateRegion
CreateRoundRectRgn
StretchBlt
SelectObject
GetStockObject
CreateCompatibleBitmap
CreateBitmap
CreateFontA
CreatePen
Rectangle
GetTextExtentPoint32A
CreateFontIndirectA
CreateSolidBrush
DeleteObject
CreateCompatibleDC
GetObjectA
BitBlt
winspool.drv
ord201
advapi32
LookupPrivilegeValueA
RegDeleteValueA
CreateServiceA
ChangeServiceConfig2A
StartServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
QueryServiceStatus
RegQueryInfoKeyA
RegEnumValueA
RegGetKeySecurity
RegDeleteKeyA
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
RegSetKeySecurity
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyA
RegOpenKeyA
AdjustTokenPrivileges
InitializeSecurityDescriptor
OpenProcessToken
RegSetValueExA
SetSecurityDescriptorDacl
shell32
SHGetSpecialFolderPathA
ShellExecuteA
comctl32
_TrackMouseEvent
ole32
CoUninitialize
CoInitialize
CreateStreamOnHGlobal
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoCreateInstance
olepro32
ord251
oleaut32
VariantClear
VariantInit
wsock32
listen
gethostbyname
gethostname
WSACleanup
WSAStartup
shutdown
ntohs
recvfrom
bind
closesocket
recv
WSAGetLastError
send
connect
ioctlsocket
setsockopt
socket
inet_addr
WSAAsyncSelect
htonl
ntohl
select
htons
sensapi
IsNetworkAlive
iphlpapi
GetNetworkParams
ws2_32
WSACloseEvent
WSAEnumNetworkEvents
WSAEventSelect
WSACreateEvent
WSAWaitForMultipleEvents
WSAIoctl
WSASocketA
WSAConnect
WSASend
WSARecv
pmfc10
?GetValueEx@CMetpParser@@QAEHPBDAAPADAAH@Z
?GetValueEx@CMetpParser@@QAEHPBDAAH@Z
??1CBIPConfig@@UAE@XZ
?GetAdapterName@CBIPConfig@@QAEPBDH@Z
?GetAdapterCount@CBIPConfig@@QBEHXZ
??0CBIPConfig@@QAE@XZ
?GetFileVersion@CFunc@@SA?AVCString@@V2@@Z
?CutString@CFunc@@SAXHAAVCString@@0@Z
?IsRRN@CFunc@@SAHVCString@@@Z
?ChatMsgAlram@CFunc@@SAXXZ
?GetFullScreenWindow@CFunc@@SAPAUHWND__@@XZ
??1Synchronized@@UAE@XZ
??0Synchronized@@QAE@AAU_RTL_CRITICAL_SECTION@@@Z
?SetWin9xSafeMode@CLib@@SAHH@Z
?GetDesktopPath@CFunc@@SA?AVCString@@XZ
?FileCopy@CFunc@@SAHVCString@@0@Z
?GetIPAddress@CFunc@@SA?AVCString@@XZ
??1CTimeTrackLib@@UAE@XZ
??0CTimeTrackLib@@QAE@XZ
?pmInitRIT@CTimeTrackLib@@QAEKXZ
?pmNewIncrementRp@CTimeTrackLib@@QAEHPAD@Z
?pmCreateStaticRp@CTimeTrackLib@@QAEHXZ
?pmGetRPInfo@CTimeTrackLib@@QAEHPAVCPtrList@@@Z
?pmRestoreIncrementRp@CTimeTrackLib@@QAEHK@Z
?pmRestoreStaticRp@CTimeTrackLib@@QAEHXZ
?pmSetSetting@CTimeTrackLib@@QAEHH@Z
?SetURL@CMetpParser@@QAEHPBD@Z
?ForceClassicControlPanel@CFunc@@SAHH@Z
?InstallPicaVNC9x@CFunc@@SAXVCString@@@Z
?szCopy@CFunc@@SAXPAD0H@Z
?GetCPUProcessorName@CSystemInfo@@QAE?AVCString@@XZ
?GetVGAInfo@CSystemInfo@@QAE?AVCString@@XZ
?GetUnInstallList@CSystemInfo@@QAEPAVCStringList@@XZ
??0CVolumeControl@@QAE@XZ
?amdInitialize@CVolumeControl@@QAEHPAUHWND__@@@Z
?amdGetMasterVolumeControl@CVolumeControl@@QAEHXZ
?amdGetMasterVolumeValue@CVolumeControl@@QAEHAAK@Z
?amdUninitialize@CVolumeControl@@QAEHXZ
??1CVolumeControl@@UAE@XZ
??0CSystemInfo@@QAE@XZ
?GetHDDSpaceInfo@CSystemInfo@@QAEHPAVCPtrList@@@Z
??1CSystemInfo@@UAE@XZ
?GetMacAddress@CFunc@@SAPAVCStringList@@H@Z
??0CMetpParser@@QAE@PBD00H0G@Z
?AddValue@CMetpParser@@QAEHPBD0H@Z
?GetModulePath@CFunc@@SA?AVCString@@XZ
?AddValue@CMetpParser@@QAEHPBDH@Z
?GetURL@CMetpParser@@QAEHAAPADAAH@Z
??1CMetpParser@@UAE@XZ
?IsWindowsNT4SP3orLater@CFunc@@SAHXZ
?IsNumber@CFunc@@SAHVCString@@H@Z
?GetYear@CFunc@@SAHXZ
?HTTPDown@CFunc@@SAHPAD0K@Z
?GetSystemFolder@CFunc@@SA?AVCString@@XZ
?TerminateProcessA@CFunc@@SAXPAUHWND__@@@Z
?AddValue@CMetpParser@@QAEHPBDI@Z
?GetCurTime@CPmTime@@SA?AVCOleDateTime@@XZ
?TerminateProcessByPID@CFunc@@SAXK@Z
?szCopy@CFunc@@SAXPADPAEH@Z
?GetDriverCodeByName@CFunc@@SAHVCString@@@Z
?GetSystemDriver@CFunc@@SA?AVCString@@XZ
?GetProgramFilesFolder@CFunc@@SA?AVCString@@XZ
?GetWindowsFolder@CFunc@@SA?AVCString@@XZ
?pmSetPassword@CTimeTrackLib@@QAEHPAD@Z
??0CMetpParser@@QAE@XZ
?pmSetRpName@CTimeTrackLib@@QAEHKPAD@Z
?ControlPanel_Enable_Disable@CFunc@@SAHVCString@@H@Z
?amdSetMasterVolumeValue@CVolumeControl@@QAEHK@Z
wininet
InternetReadFile
InternetQueryDataAvailable
HttpQueryInfoA
InternetSetCookieA
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
shlwapi
PathCanonicalizeA
PathAddBackslashA
PathSkipRootA
PathStripPathA
rpcrt4
RpcStringFreeA
UuidCreate
UuidToStringA
msvcp60
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
imm32
ImmGetContext
ImmSetConversionStatus
ImmReleaseContext
winmm
PlaySoundA
Sections
.text Size: 636KB - Virtual size: 635KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 112KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ