Static task
static1
Behavioral task
behavioral1
Sample
dc487240e0386a32a24343692b56dea3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc487240e0386a32a24343692b56dea3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc487240e0386a32a24343692b56dea3_JaffaCakes118
-
Size
428KB
-
MD5
dc487240e0386a32a24343692b56dea3
-
SHA1
48860f78181043963b5adae8a61943f2285773f0
-
SHA256
d989ee866e7e62c4d5bf80fb9420e82a1cb3e470b3ed51d502e3a56cb9c51bbf
-
SHA512
dc78e1eebea1905f9ad22534d36c9f4c60b8f214622bb594aa74d280c285b0ddc9543cae75555986e8f75a2ec33da2e93517a4dfe861f6795e74590cc8ea9fe1
-
SSDEEP
6144:uM8kZyLeNmhVlJtpaLZUOrS6BPuCNJrRz0BaaoBAupP6JGyxL07PyAtZjg7En:uM8kOeNmhVlT4RVJrRFlgJ/qPpFn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dc487240e0386a32a24343692b56dea3_JaffaCakes118
Files
-
dc487240e0386a32a24343692b56dea3_JaffaCakes118.exe windows:4 windows x86 arch:x86
4d87deccd29e23757d5f87e89ca7ac03
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
kernel32
HeapFree
CreateThread
RtlUnwind
HeapReAlloc
HeapAlloc
SetCurrentDirectoryA
GetFileType
RaiseException
ExitThread
GetModuleHandleA
GetCommandLineA
GetTimeZoneInformation
GetSystemTime
TerminateProcess
HeapSize
GetCPInfo
GetACP
GetOEMCP
GetStartupInfoA
HeapDestroy
SetUnhandledExceptionFilter
GetFileAttributesA
UnhandledExceptionFilter
LCMapStringA
LCMapStringW
SetStdHandle
SetHandleCount
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStringTypeA
WritePrivateProfileStringA
GetCurrentDirectoryA
IsBadWritePtr
IsBadCodePtr
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetErrorMode
GlobalGetAtomNameA
GlobalAddAtomA
GetModuleFileNameA
GetFullPathNameA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GetCurrentProcess
DuplicateHandle
VirtualAlloc
VirtualFree
CreateProcessA
FormatMessageA
LocalFree
GetLastError
WriteFile
GetLocalTime
QueryPerformanceFrequency
GetTickCount
QueryPerformanceCounter
GetDateFormatA
WaitForSingleObject
ResetEvent
SetEvent
GetWindowsDirectoryA
ExpandEnvironmentStringsA
CreateDirectoryA
CreateFileA
MoveFileA
GetFileSize
ReadFile
Sleep
CloseHandle
CreateEventA
GetLocaleInfoA
DeleteFileA
ExitProcess
lstrcpyA
GetVersion
GetProcessVersion
GlobalFlags
lstrcmpiA
MulDiv
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
lstrcpynA
ResumeThread
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetCurrentThread
FileTimeToSystemTime
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GetThreadLocale
GlobalLock
GlobalUnlock
GlobalFree
FindResourceA
LoadResource
LockResource
lstrcatA
GetCurrentThreadId
DeviceIoControl
LoadLibraryA
GetProcAddress
FreeLibrary
GetFileInformationByHandle
FileTimeToLocalFileTime
FileTimeToDosDateTime
GetFileTime
GetDriveTypeA
GetSystemDefaultLCID
GetSystemDirectoryA
GetComputerNameA
lstrlenA
SetLastError
CopyFileA
FindFirstFileA
FindClose
GetStringTypeW
IsBadReadPtr
HeapCreate
user32
ReleaseCapture
WindowFromPoint
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
SetRectEmpty
LoadAcceleratorsA
TranslateAcceleratorA
LoadMenuA
SetMenu
ReuseDDElParam
UnpackDDElParam
IsIconic
BringWindowToTop
PostThreadMessageA
GrayStringA
TabbedTextOutA
GetWindowDC
GetSysColorBrush
ClientToScreen
PtInRect
GetClassNameA
MapDialogRect
GetMessageA
ValidateRect
GetCursorPos
ShowOwnedPopups
PostQuitMessage
CharUpperA
CharNextA
OffsetRect
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
EnableMenuItem
MoveWindow
GetNextDlgTabItem
GetActiveWindow
PostMessageA
SystemParametersInfoA
MapWindowPoints
SetActiveWindow
SetFocus
AdjustWindowRectEx
EqualRect
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
ScreenToClient
GetTopWindow
IsWindowEnabled
IsChild
GetCapture
GetClassInfoA
RegisterClassA
GetMenuItemCount
GetMenuItemID
GetKeyState
CopyAcceleratorTableA
SetWindowsHookExA
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
RemovePropA
GetMessageTime
GetMessagePos
GetWindow
RegisterWindowMessageA
CreatePopupMenu
AppendMenuA
IsClipboardFormatAvailable
TrackPopupMenu
DestroyMenu
wsprintfA
CallWindowProcA
GetAsyncKeyState
IsDialogMessageA
IsWindow
CreateDialogParamA
DestroyWindow
MessageBoxA
UpdateWindow
DefWindowProcA
GetWindowTextA
BeginPaint
EndPaint
GetDlgCtrlID
GetWindowLongA
SetWindowLongA
IsWindowVisible
GetDC
ReleaseDC
GetClientRect
GetWindowRect
GetSystemMetrics
SetWindowPos
FillRect
CopyRect
InflateRect
DrawFocusRect
DrawTextA
GetParent
GetScrollPos
SetScrollInfo
SetDlgItemTextA
SetDlgItemInt
CheckDlgButton
GetDlgItemTextA
IsDlgButtonChecked
SetRect
CreateWindowExA
GetFocus
GetWindowTextLengthA
GetSubMenu
SetWindowTextA
EndDialog
TranslateMessage
DispatchMessageA
PeekMessageA
SendMessageA
SendDlgItemMessageA
InvalidateRect
ShowWindow
GetMenu
CheckMenuItem
SetClassLongA
GetDlgItem
GetPropA
SetPropA
GetClassLongA
SetCursor
ChildWindowFromPoint
WinHelpA
GetClassInfoExA
LoadIconA
RegisterClassExA
LoadCursorA
GetSysColor
GetDesktopWindow
DialogBoxParamA
LoadStringA
FindWindowA
EnableWindow
UnhookWindowsHookEx
CallNextHookEx
CreateDialogIndirectParamA
UnregisterClassA
gdi32
GetTextMetricsA
DeleteObject
SetTextColor
SetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SetMapMode
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
ExtTextOutA
Escape
DPtoLP
LPtoDP
GetMapMode
RestoreDC
SaveDC
GetStockObject
GetBkColor
GetTextColor
CreateBitmap
GetObjectA
SetBkColor
SetAbortProc
StartDocA
GetTextExtentPointA
GetDeviceCaps
StartPage
TextOutA
EndPage
EndDoc
AbortDoc
DeleteDC
GetTextFaceA
CreateFontA
SetBkMode
CreatePen
SelectObject
Rectangle
MoveToEx
LineTo
OffsetViewportOrgEx
CreateSolidBrush
comdlg32
GetOpenFileNameA
GetFileTitleA
PrintDlgA
GetSaveFileNameA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
GetUserNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyExA
RegOpenKeyA
RegFlushKey
RegSetValueExA
RegCreateKeyExA
shell32
DragQueryFileA
DragFinish
comctl32
ord2
ord6
ord17
ImageList_Destroy
oledlg
ord8
ole32
CreateILockBytesOnHGlobal
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CoGetClassObject
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
StgCreateDocfile
CoRegisterMessageFilter
OleIsCurrentClipboard
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
OleFlushClipboard
CoRevokeClassObject
CLSIDFromProgID
olepro32
ord253
oleaut32
VariantClear
SysAllocStringLen
SysFreeString
VarBstrFromDate
SysAllocString
VariantChangeType
SysAllocStringByteLen
SysStringLen
wininet
HttpAddRequestHeadersA
InternetReadFile
InternetAttemptConnect
InternetConnectA
InternetErrorDlg
InternetCloseHandle
InternetOpenA
HttpOpenRequestA
HttpSendRequestA
Sections
.text Size: 268KB - Virtual size: 267KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 40KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE