Static task
static1
Behavioral task
behavioral1
Sample
dae190288ed1f5230bcb2f374ece3398_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dae190288ed1f5230bcb2f374ece3398_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dae190288ed1f5230bcb2f374ece3398_JaffaCakes118
-
Size
1.1MB
-
MD5
dae190288ed1f5230bcb2f374ece3398
-
SHA1
0a1f0c8a4fc4bf0606e1689dca34193c1be5e6df
-
SHA256
6a07a8b5216dad2561bc4db5d7ec33a2fb699d31ee40e6acb82333f7f7ac8f8f
-
SHA512
2e49e238d1c837af1fe0fbcfdb1be0abbc554e559b20d11a4eadef355ff342c5836627c0f5459d61f54fcb186baedaaccb37e8f3d583405441b76bab08e438ea
-
SSDEEP
12288:8XoLvN0eC0SWKBLO1ei047QrSK1k3NDYRDv1rQOospoq/qsPYaPweQgE3C:8Xox0ergPPYYRb1rXosR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dae190288ed1f5230bcb2f374ece3398_JaffaCakes118
Files
-
dae190288ed1f5230bcb2f374ece3398_JaffaCakes118.exe windows:4 windows x86 arch:x86
cd213087b5aa018c9b3865a54db84226
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
inet_addr
WSACleanup
accept
gethostbyname
send
recv
htons
socket
bind
listen
shutdown
gethostname
WSAStartup
gethostbyaddr
closesocket
ioctlsocket
kernel32
HeapAlloc
HeapReAlloc
HeapSize
GetStartupInfoA
GetCommandLineA
RtlUnwind
RaiseException
TerminateProcess
ExitThread
CreateThread
LCMapStringA
LCMapStringW
GetTimeZoneInformation
HeapFree
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStringTypeA
GetStringTypeW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetCurrentProcessId
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
GetDateFormatA
GetTimeFormatA
GetSystemTimeAsFileTime
SetErrorMode
GetFileTime
GetFileAttributesA
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
GlobalFlags
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
WritePrivateProfileStringA
FindFirstFileA
FileTimeToLocalFileTime
FindNextFileA
FindClose
FileTimeToSystemTime
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
WaitForSingleObject
SetLastError
lstrcpynA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
GetProcAddress
FreeResource
GlobalUnlock
GlobalLock
MulDiv
lstrcmpA
GetVersion
CompareStringA
MultiByteToWideChar
CompareStringW
GlobalFree
GlobalAlloc
InterlockedDecrement
InterlockedIncrement
MoveFileA
MoveFileExA
DeleteFileA
ExitProcess
GetCurrentThreadId
lstrlenA
GetModuleFileNameA
GetModuleHandleA
lstrcmpiA
GetDriveTypeA
GetLogicalDriveStringsA
QueryPerformanceCounter
Sleep
QueryPerformanceFrequency
CreateDirectoryA
CreateMutexA
GlobalSize
GetTickCount
LocalFree
WideCharToMultiByte
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
FormatMessageA
GetVersionExA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
ReadFile
SetFilePointer
GetFileSize
GetLastError
lstrcpyA
CloseHandle
WriteFile
CreateFileA
SizeofResource
LockResource
LoadResource
FindResourceA
VirtualProtect
user32
PostThreadMessageA
SetParent
ShowOwnedPopups
TranslateMessage
ValidateRect
RegisterClipboardFormatA
EndPaint
BeginPaint
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
CheckRadioButton
CheckDlgButton
wsprintfA
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
GetMenuCheckMarkDimensions
RegisterWindowMessageA
WinHelpA
CreateWindowExA
GetClassLongA
GetClassInfoExA
SendDlgItemMessageA
GetFocus
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetLastActivePopup
GetTopWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
MessageBoxA
TrackPopupMenu
GetKeyState
SetForegroundWindow
GetMenuItemID
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
UnregisterClassA
SetWindowPlacement
DefWindowProcA
GetWindowPlacement
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
IsWindowEnabled
GetNextDlgTabItem
EndDialog
InsertMenuItemA
IntersectRect
SetWindowPos
FillRect
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
GetDlgItem
CallWindowProcA
GetWindowLongA
GetForegroundWindow
EqualRect
IsWindowVisible
SetWindowLongA
GetMenuItemRect
GetClassNameA
GetSystemMenu
GetMenuItemCount
IsMenu
GetMenu
GetPropA
RemovePropA
SetPropA
DrawStateA
DestroyIcon
SystemParametersInfoA
GetMenuItemInfoA
GrayStringA
DrawTextExA
TabbedTextOutA
DispatchMessageA
GetMessageA
PtInRect
GetCapture
InflateRect
GetParent
CharUpperA
VkKeyScanA
ReleaseCapture
ScreenToClient
WindowFromPoint
UnionRect
SetCapture
BringWindowToTop
PostQuitMessage
CheckMenuItem
DrawIcon
IsIconic
GetSysColor
IsRectEmpty
SetMenu
CopyImage
ClientToScreen
LoadIconA
GetDesktopWindow
DrawIconEx
GetDCEx
UnpackDDElParam
ReuseDDElParam
LoadAcceleratorsA
TranslateAcceleratorA
TranslateMDISysAccel
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
DestroyCursor
GetWindowDC
GetDlgCtrlID
GetSubMenu
SetMenuItemInfoA
LoadMenuA
GetCursorPos
LockWindowUpdate
UpdateWindow
InvalidateRect
GetWindow
OffsetRect
GetClientRect
SetRectEmpty
ReleaseDC
SetCursor
DrawTextA
PostMessageA
GetDC
KillTimer
SetTimer
GetWindowRect
DrawMenuBar
DefMDIChildProcA
DefFrameProcA
DestroyMenu
FindWindowA
GetSystemMetrics
LoadBitmapA
CopyRect
RedrawWindow
RegisterClassExA
GetSysColorBrush
LoadCursorA
SetRect
EnableWindow
SendMessageA
CreatePopupMenu
gdi32
SetViewportOrgEx
SetBkColor
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
SelectPalette
SetRectRgn
DPtoLP
SetBoundsRect
GetBkMode
GetBkColor
PlgBlt
CreateRectRgnIndirect
Ellipse
GetTextMetricsA
GetTextExtentPoint32A
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SetPixel
GetTextColor
SetTextColor
SelectClipRgn
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateFontA
GetCharWidthA
CreatePatternBrush
DeleteDC
CreateBitmap
GetCurrentObject
CreateCompatibleBitmap
BitBlt
DeleteObject
CombineRgn
CreateRectRgn
GetPixel
SelectObject
CreateCompatibleDC
GetObjectA
GetStockObject
CreateFontIndirectA
CreateSolidBrush
GetClipBox
Rectangle
CreatePen
SetDIBits
GetDIBits
CreateDIBitmap
RealizePalette
CreatePalette
GetDeviceCaps
StretchBlt
PatBlt
StretchDIBits
comdlg32
GetSaveFileNameA
GetFileTitleA
GetOpenFileNameA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegSetValueExA
shell32
DragQueryFileA
ShellExecuteA
SHGetDesktopFolder
SHGetMalloc
Shell_NotifyIconA
SHGetFileInfoA
DragFinish
comctl32
ImageList_BeginDrag
ImageList_GetImageCount
ImageList_Remove
ImageList_SetImageCount
ImageList_DragEnter
ImageList_Replace
ord14
ord17
_TrackMouseEvent
ImageList_Draw
ImageList_DragMove
ImageList_DragLeave
ImageList_EndDrag
ImageList_GetIcon
ImageList_ReplaceIcon
ord13
ImageList_Destroy
ImageList_Create
ImageList_LoadImageA
ImageList_AddMasked
ImageList_GetImageInfo
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CoUninitialize
CreateStreamOnHGlobal
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CoInitialize
CoGetClassObject
oleaut32
VariantCopy
SafeArrayRedim
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SysAllocStringByteLen
SysAllocStringLen
VariantInit
VariantChangeType
OleLoadPicture
SysAllocString
VariantClear
wininet
InternetConnectA
FtpPutFileA
InternetCloseHandle
InternetOpenA
oleacc
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 432KB - Virtual size: 429KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 892KB - Virtual size: 891KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ