Static task
static1
Behavioral task
behavioral1
Sample
db4e92843b4a8a26b79279040bd4656e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db4e92843b4a8a26b79279040bd4656e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
db4e92843b4a8a26b79279040bd4656e_JaffaCakes118
-
Size
269KB
-
MD5
db4e92843b4a8a26b79279040bd4656e
-
SHA1
aa4ee64f3c690142ba423c20033cd553a2f62478
-
SHA256
f58136eeb6b44041399a6f24b98a0c74c3c4519a1c7bd0ef76ed481e1734de23
-
SHA512
4353979aa32cdd0b6d60c1a674b8bea9c0f888da876324d69dde1f8a7573467ac025cf3443511078ef42c65a89b84a9a29561ad79d7d8ea17886ceae13c32b9e
-
SSDEEP
6144:ehlgpAFmrho5HUGHixKSvtENhoLeJ/55akIJWp0I:ehlgWlHUmiMatENNJ/+kIJW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db4e92843b4a8a26b79279040bd4656e_JaffaCakes118
Files
-
db4e92843b4a8a26b79279040bd4656e_JaffaCakes118.exe windows:4 windows x86 arch:x86
d46dc1dfb32dd4bb3d816add12e9e2cf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
netapi32
NetApiBufferFree
NetWkstaGetInfo
NetSessionEnum
NetMessageBufferSend
kernel32
GetFileAttributesA
GetSystemTimeAsFileTime
HeapReAlloc
VirtualAlloc
RtlUnwind
GetCommandLineA
GetStartupInfoA
RaiseException
HeapSize
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetCurrentProcess
SetEndOfFile
FlushFileBuffers
GetOEMCP
GetCPInfo
GetLocaleInfoA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetThreadLocale
GlobalGetAtomNameA
GlobalFlags
lstrcmpA
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
GetModuleHandleA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
GetCurrentProcessId
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FindResourceA
LoadResource
LockResource
SizeofResource
SetLastError
GetDriveTypeA
SetErrorMode
CreateMutexA
OpenMutexA
SetFilePointer
WaitForMultipleObjects
LocalAlloc
LocalLock
ReleaseMutex
LocalUnlock
GetSystemInfo
MoveFileA
ResetEvent
WaitForSingleObject
DeviceIoControl
CreateEventA
SetEvent
CompareStringA
CreateDirectoryA
Sleep
WTSGetActiveConsoleSessionId
CreateToolhelp32Snapshot
Process32First
ProcessIdToSessionId
Process32Next
OpenProcess
FormatMessageA
lstrlenA
LocalFree
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
GetProcessHeap
HeapAlloc
HeapFree
GetVersion
GetVersionExA
LoadLibraryA
ExitProcess
CreateThread
GetProcAddress
FreeLibrary
GetSystemTime
CreateFileA
ReadFile
CloseHandle
WriteFile
GetModuleFileNameA
TerminateProcess
user32
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetClientRect
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
GetWindowTextA
SetWindowTextA
UnregisterClassA
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
PostQuitMessage
SetForegroundWindow
GetKeyState
PeekMessageA
ValidateRect
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
gdi32
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
SetMapMode
GetDeviceCaps
DeleteObject
CreateBitmap
GetClipBox
SetTextColor
SetBkColor
ExtTextOutA
SaveDC
RestoreDC
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
IsValidSid
LookupAccountSidA
StartServiceA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
OpenServiceA
OpenSCManagerA
CloseServiceHandle
SetServiceStatus
OpenProcessToken
LookupPrivilegeValueA
DuplicateTokenEx
SetTokenInformation
AdjustTokenPrivileges
CreateProcessAsUserA
RegOpenKeyA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegEnumValueA
RegQueryInfoKeyA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
shell32
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
oleaut32
VariantChangeType
VariantClear
VariantInit
wtsapi32
WTSQueryUserToken
userenv
CreateEnvironmentBlock
Sections
.text Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vrdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE