Static task
static1
Behavioral task
behavioral1
Sample
d672dc50c55d5c80d85329fa70001a9e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d672dc50c55d5c80d85329fa70001a9e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d672dc50c55d5c80d85329fa70001a9e_JaffaCakes118
-
Size
322KB
-
MD5
d672dc50c55d5c80d85329fa70001a9e
-
SHA1
40b85c8333a9b39a04c7710c35f30865ade7610c
-
SHA256
1228531e1189c865f1615fc22a6859ced8af74b07453717cb9456dca04533fd9
-
SHA512
f05c2ce929369faf36e585d17f2d82f5ff4e2dcbe9508e035daba77f87a3afe3cecbf3eb7b2bea2c86655ce02458cff3274a7c518381ed43858ae9832e10a6a1
-
SSDEEP
3072:/ZEtvIvQMr5q0i+77RyoqtxMeoCE/vFM7oFQhTFb8ELx2SDIMEI6K+l7f0mz9jDe:GtvgDz7VyoAeCOSk2TFbjLuflt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d672dc50c55d5c80d85329fa70001a9e_JaffaCakes118
Files
-
d672dc50c55d5c80d85329fa70001a9e_JaffaCakes118.exe windows:4 windows x86 arch:x86
f2c1efd0a46c04a0ab8be15024326e82
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
gethostbyname
inet_addr
recv
gethostname
htonl
socket
bind
setsockopt
inet_ntoa
closesocket
WSAAsyncSelect
connect
ioctlsocket
htons
WSAAsyncGetHostByName
WSACleanup
WSAGetLastError
accept
listen
send
WSAStartup
WSACancelBlockingCall
kernel32
SetErrorMode
FileTimeToSystemTime
FileTimeToLocalFileTime
GlobalAddAtomA
GlobalGetAtomNameA
GetTickCount
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
RaiseException
HeapAlloc
HeapFree
ExitProcess
ExitThread
HeapSize
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
GetTimeZoneInformation
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
GetFileSize
GetFileTime
LCMapStringA
LCMapStringW
VirtualAlloc
GetStringTypeA
GetStringTypeW
GetDriveTypeA
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
GetLocaleInfoA
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetCurrentThread
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
GetVersion
lstrcatA
GetCurrentThreadId
FindResourceA
LoadResource
LockResource
SetCurrentDirectoryA
GetCurrentDirectoryA
GetModuleFileNameA
OpenFile
GlobalSize
_lclose
_lwrite
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalReAlloc
GlobalFree
GetProfileStringA
GetFileAttributesA
WritePrivateProfileStringA
SizeofResource
GetVersionExA
GetProcessVersion
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalHandle
TlsAlloc
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
EnterCriticalSection
FindNextFileA
GetThreadLocale
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
lstrcpyA
LoadLibraryA
GetProcAddress
FreeLibrary
DeleteFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
FormatMessageA
LocalFree
lstrcpynA
GetLastError
SetLastError
MulDiv
CreateEventA
SuspendThread
SetThreadPriority
ResumeThread
SetEvent
WaitForSingleObject
CloseHandle
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
VirtualFree
SetUnhandledExceptionFilter
TerminateProcess
CreateThread
user32
ReleaseCapture
WindowFromPoint
OffsetRect
MessageBeep
GetNextDlgGroupItem
CharNextA
CopyAcceleratorTableA
SetRect
SetRectEmpty
LoadAcceleratorsA
TranslateAcceleratorA
LoadMenuA
SetMenu
ReuseDDElParam
UnpackDDElParam
IsIconic
BringWindowToTop
IntersectRect
InflateRect
RegisterClipboardFormatA
PostThreadMessageA
MessageBoxA
SetCursor
ShowOwnedPopups
PostQuitMessage
LoadStringA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
GetNextDlgTabItem
EndDialog
GetSystemMetrics
CreateDialogIndirectParamA
UpdateWindow
GetCursorPos
SystemParametersInfoA
MapWindowPoints
ValidateRect
DestroyMenu
BeginPaint
EndPaint
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetClientRect
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
IsWindowVisible
ScreenToClient
ScrollWindow
SetScrollInfo
SetScrollRange
GetScrollPos
SetScrollPos
IsChild
GetParent
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetMenu
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
DestroyWindow
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
SetPropA
UnhookWindowsHookEx
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetPropA
CallWindowProcA
LoadCursorA
ClientToScreen
PtInRect
GetClassNameA
CharUpperA
GrayStringA
DrawTextA
TabbedTextOutA
RemovePropA
GetMessageTime
GetMessagePos
GetWindowRect
GetWindowLongA
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
PostMessageA
IsWindowEnabled
GetActiveWindow
SetActiveWindow
GetDesktopWindow
GetTopWindow
GetWindow
InvalidateRect
FindWindowA
GetSysColor
GetSysColorBrush
MapDialogRect
SendDlgItemMessageA
SetFocus
LoadIconA
GetDC
ReleaseDC
EnableWindow
PeekMessageA
TranslateMessage
DispatchMessageA
SetTimer
KillTimer
SendMessageA
GetFocus
GetMessageA
IsWindow
ShowScrollBar
GetWindowDC
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
IsWindowUnicode
gdi32
SetTextColor
CreateDCA
CreateCompatibleDC
GetDeviceCaps
SetBkColor
CreateBitmap
GetSystemPaletteEntries
GetStockObject
GetObjectA
SelectPalette
RealizePalette
CreateDIBitmap
SetBkMode
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateCompatibleBitmap
BitBlt
OffsetViewportOrgEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
IntersectClipRect
DeleteObject
SetMapMode
GetViewportExtEx
GetWindowExtEx
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
LPtoDP
DPtoLP
GetTextExtentPointA
GetTextColor
GetBkColor
PatBlt
GetMapMode
SetViewportExtEx
SetViewportOrgEx
GetDIBits
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
shell32
DragFinish
DragQueryFileA
ShellExecuteA
comctl32
ImageList_Destroy
ord17
oledlg
ord8
ole32
CLSIDFromProgID
CLSIDFromString
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CreateILockBytesOnHGlobal
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
CoGetClassObject
oleaut32
OleCreateFontIndirect
SysFreeString
SysStringLen
SysAllocStringLen
VariantChangeType
VariantClear
SysAllocString
SysAllocStringByteLen
wininet
InternetWriteFile
InternetGetLastResponseInfoA
HttpQueryInfoA
HttpOpenRequestA
FtpGetFileA
InternetConnectA
InternetQueryDataAvailable
InternetReadFile
InternetQueryOptionA
InternetSetFilePointer
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetCloseHandle
InternetSetStatusCallback
InternetOpenUrlA
InternetOpenA
Sections
.text Size: 204KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ